Multiple cross-site request forgery (CSRF) vulnerabilities in Mibew Messenger 1.6.4 and earlier allow remote attackers to hijack the authentication of operators for requests that insert cross-site scripting (XSS) sequences via the (1) address or (2) threadid parameters to operator/ban.php; or (3) geolinkparams, (4) title, or (5) chattitle parameters to operator/settings.php.
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Mibew_messenger | Mibew | * | 1.6.4 (including) |
Mibew_messenger | Mibew | 1.0.6 (including) | 1.0.6 (including) |
Mibew_messenger | Mibew | 1.0.7 (including) | 1.0.7 (including) |
Mibew_messenger | Mibew | 1.0.8 (including) | 1.0.8 (including) |
Mibew_messenger | Mibew | 1.0.9 (including) | 1.0.9 (including) |
Mibew_messenger | Mibew | 1.0.10 (including) | 1.0.10 (including) |
Mibew_messenger | Mibew | 1.4.0 (including) | 1.4.0 (including) |
Mibew_messenger | Mibew | 1.4.1 (including) | 1.4.1 (including) |
Mibew_messenger | Mibew | 1.4.2 (including) | 1.4.2 (including) |
Mibew_messenger | Mibew | 1.5.0 (including) | 1.5.0 (including) |
Mibew_messenger | Mibew | 1.5.1 (including) | 1.5.1 (including) |
Mibew_messenger | Mibew | 1.5.2 (including) | 1.5.2 (including) |
Mibew_messenger | Mibew | 1.6.0 (including) | 1.6.0 (including) |
Mibew_messenger | Mibew | 1.6.1 (including) | 1.6.1 (including) |
Mibew_messenger | Mibew | 1.6.2 (including) | 1.6.2 (including) |
Mibew_messenger | Mibew | 1.6.3 (including) | 1.6.3 (including) |