Vulnerability CVE-2014-8998


Published: 2014-11-20

Description:
lib/message.php in X7 Chat 2.0.0 through 2.0.5.1 allows remote authenticated users to execute arbitrary PHP code via a crafted HTTP header to index.php, which is processed by the preg_replace function with the eval switch.

See advisories in our WLB2 database:
Topic
Author
Date
High
X7 Chat 2.0.5 lib/message.php preg_replace() PHP Code Execution
Juan
05.11.2014

CVSS2 => (AV:N/AC:L/Au:S/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.5/10
6.4/10
8/10
Exploit range
Attack complexity
Authentication
Remote
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
X7chat -> X7 chat 

 References:
http://packetstormsecurity.com/files/128964/X7-Chat-2.0.5-lib-message.php-preg_replace-PHP-Code-Execution.html
http://www.exploit-db.com/exploits/35183
http://www.securityfocus.com/bid/71014
https://exchange.xforce.ibmcloud.com/vulnerabilities/98513

Copyright 2024, cxsecurity.com

 

Back to Top