Miggo Logo

CVE-2021-4132: livehelperchat is vulnerable to Cross-site Scripting

5.4

CVSS Score
3.1

Basic Information

EPSS Score
0.40806%
Published
1/5/2022
Updated
2/3/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
remdex/livehelperchatcomposer< 3.913.91

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from two key issues: 1) Missing HTML escaping in the Email field's value attribute in edit.tpl.php (CWE-79), allowing classic XSS. 2) Absence of ng-non-bindable attributes in multiple input fields across templates, enabling AngularJS context-based XSS. The patch added ng-non-bindable to prevent Angular interpretation and enforced input length limits, but the unescaped Email field remained a separate XSS vector. The combination of missing context-aware escaping and Angular binding controls created exploitable XSS scenarios in user account fields.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

liv***lp*r***t is vuln*r**l* to Improp*r N*utr*liz*tion o* Input *urin* W** P*** **n*r*tion ('*ross-sit* S*riptin*')

Reasoning

T** vuln*r**ility st*ms *rom two k*y issu*s: *) Missin* *TML *s**pin* in t** *m*il *i*l*'s v*lu* *ttri*ut* in **it.tpl.p*p (*W*-**), *llowin* *l*ssi* XSS. *) **s*n** o* n*-non-*in***l* *ttri*ut*s in multipl* input *i*l*s **ross t*mpl*t*s, *n**lin* *n