Session fixation vulnerability in phpFreeChat 1.1 allows remote authenticated users to hijack web sessions by setting the session_id parameter to match the victims nickid parameter.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Phpfreechat | Phpfreechat | 1.0-beta (including) | 1.0-beta (including) |
Phpfreechat | Phpfreechat | 1.0-beta10 (including) | 1.0-beta10 (including) |
Phpfreechat | Phpfreechat | 1.0-beta11 (including) | 1.0-beta11 (including) |
Phpfreechat | Phpfreechat | 1.0-beta2 (including) | 1.0-beta2 (including) |
Phpfreechat | Phpfreechat | 1.0-beta3 (including) | 1.0-beta3 (including) |
Phpfreechat | Phpfreechat | 1.0-beta4 (including) | 1.0-beta4 (including) |
Phpfreechat | Phpfreechat | 1.0-beta5 (including) | 1.0-beta5 (including) |
Phpfreechat | Phpfreechat | 1.0-beta6 (including) | 1.0-beta6 (including) |
Phpfreechat | Phpfreechat | 1.0-beta7 (including) | 1.0-beta7 (including) |
Phpfreechat | Phpfreechat | 1.0-beta8 (including) | 1.0-beta8 (including) |
Phpfreechat | Phpfreechat | 1.0-beta9 (including) | 1.0-beta9 (including) |
Phpfreechat | Phpfreechat | 1.0-final (including) | 1.0-final (including) |
Phpfreechat | Phpfreechat | 1.1 (including) | 1.1 (including) |