Share
## https://sploitus.com/exploit?id=PACKETSTORM:157594
# Exploit Title: iChat 1.6 XSS Vunlerability  
# Google Dork:N/A  
# Date: 2020-05-06  
# Exploit Author: @ThelastVvV  
# Vendor Homepage: https://codecanyon.net/item/ichat-realtime-php-live-support-system/20758162?s_rank=2  
# Version: 1.6  
# Tested on: 5.4.0-kali4-amd64  
  
---------------------------------------------------------  
  
  
Summary:  
  
Persistent Cross-site Scripting in iChat Realtime PHP Live Support System   
  
PoC 1:  
  
  
  
1- Go to the live chat widget and start the chat  
http://example.com/live-chat/  
  
2- In the text field type your payload :  
"><img src=x onerror=prompt(document.domain);>  
  
3-then hit Enter  
  
  
4- Once the admin or the agent receive the message ... the admin/agent will be xssed   
  
  
  
  
  
  
  
  
Impact:  
XSS can lead the adminstators & agents Session Hijacking,it can also lead to disclosure of sensitive data, CSRF attacks and other critical attacks on administrators and the webapp directly.  
  
  
  
  
Screentshoots:  
admin  
https://i.imgur.com/WQIO5PM.png  
agent  
https://i.imgur.com/36iNNKv.png  
user  
https://i.imgur.com/2K98PPQ.png