| VID |
210007 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The X7 Chat Program is vulnerable to a local file include vulnerability via the 'help_file' parameter. X7 Chat is free, open source and web based chatting software written in PHP. X7 Chat version 2.0 and earlier versions are vulnerable to a local file include vulnerability, caused by improper validation of user-supplied input passed to the 'help_file' parameter of the 'help/index.php' script. A remote attacker could exploit this vulnerability to view arbitrary files or to execute arbitrary PHP script code on the vulnerable system in the security context of the Web server process.
* References: http://www.securityfocus.com/archive/1/archive/1/432716/100/0/threaded http://secunia.com/advisories/19886 http://www.frsirt.com/english/advisories/2006/1608
* Platforms Affected: X7 Group, X7 Chat version 2.0 and earlier versions Any operating system Any version |
| Recommendation |
Upgrade to the latest version of X7 Chat (2.0.3 or later), available from the X7 Chat Download Web site at http://x7chat.com/ |
| Related URL |
CVE-2006-2156 (CVE) |
| Related URL |
17777 (SecurityFocus) |
| Related URL |
26218 (ISS) |
|