Korean
<< Back
VID 210007
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The X7 Chat Program is vulnerable to a local file include vulnerability via the 'help_file' parameter. X7 Chat is free, open source and web based chatting software written in PHP. X7 Chat version 2.0 and earlier versions are vulnerable to a local file include vulnerability, caused by improper validation of user-supplied input passed to the 'help_file' parameter of the 'help/index.php' script. A remote attacker could exploit this vulnerability to view arbitrary files or to execute arbitrary PHP script code on the vulnerable system in the security context of the Web server process.

* References:
http://www.securityfocus.com/archive/1/archive/1/432716/100/0/threaded
http://secunia.com/advisories/19886
http://www.frsirt.com/english/advisories/2006/1608

* Platforms Affected:
X7 Group, X7 Chat version 2.0 and earlier versions
Any operating system Any version
Recommendation Upgrade to the latest version of X7 Chat (2.0.3 or later), available from the X7 Chat Download Web site at http://x7chat.com/
Related URL CVE-2006-2156 (CVE)
Related URL 17777 (SecurityFocus)
Related URL 26218 (ISS)