Attacker-supplied HTML or JavaScript code could run in the context of the affected site, potentially allowing the attacker to steal cookie-based authentication credentials and to control how the site is rendered to the user; other attacks are also possible.
Exploit:
Attackers can exploit this issue by enticing an unsuspecting user to follow a malicious URI.
The following example URI is available:
http://www.example.com/kingchat.php?chat=2&l=2