Cross-Chat Session Bypass in chat application #2023
Replies: 1 comment
-
Hi, Few things I agree knowing chat id and hash you can do whatever you want as long chat is in open status. But same is true for any other app which uses JWT token as example... But how you know these is another story:
For your reference about hash as it's 40 charcters length...
So please user real world example and sample code. Now it seems you just writing to write without any sufficient value for Live Helper Chat. By your writing any app which usese tokens in payload/url or anywhere else is insecure which is absolutely nonsense... If you website is compromised you have much bigger problems if anyone can read cookies from your website... :) |
Beta Was this translation helpful? Give feedback.
-
Hi Live Helper Chat Community,
While checking the chat applications on the demo page, I noticed that the application generates a sidebar chat option for communicating with the operator. This chat feature uses an endpoint called '/index.php/chat/addmsguser/<chat_id>/'. However, by copying and pasting this endpoint from one support chat to another, an attacker can send messages to a different support box, which can compromise the confidentiality of user support interactions.
Steps to reproduce:
A security vulnerability allows attackers to impersonate users and send unauthorized messages to different support channels. Using brute-force techniques to obtain the chat ID, attackers can exploit this flaw to intercept and manipulate sensitive support communications. The session or cookie provided during the chat initiation process can be easily bypassed, making it easier for attackers to carry out their malicious activities.
Thanks,
Arun
Beta Was this translation helpful? Give feedback.
All reactions