• Software Link:
• Affected Versions:
Version 7.7 and prior versions.
• Vulnerability Description:
User input passed through the “live_stream_code” POST parameter to /plugin/LiveChat/getChat.json.php is not properly sanitized before being used to construct a SQL query. This can be exploited by malicious users to e.g. read sensitive data from the database through in-band SQL Injection attacks. Successful exploitation of this vulnerability requires the “Live Chat” plugin to be enabled (disabled by default).
Upgrade to version 7.8 or later.
• Disclosure Timeline:
[31/10/2019] – Issue reported to https://git.io/JeD2U
[02/11/2019] – CVE number assigned
[02/12/2019] – Versions 7.8 released
[04/12/2019] – Publication of this advisory
• CVE Reference:
Vulnerability discovered by Egidio Romano.