6.5
CVSSv2

CVE-2014-8998

Published: 20/11/2014 Updated: 08/09/2017
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
VMScore: 655
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

lib/message.php in X7 Chat 2.0.0 up to and including 2.0.5.1 allows remote authenticated users to execute arbitrary PHP code via a crafted HTTP header to index.php, which is processed by the preg_replace function with the eval switch.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

x7chat x7 chat 2.0.0

x7chat x7 chat 2.0.2

x7chat x7 chat 2.0.3

x7chat x7 chat 2.0.1

x7chat x7 chat 2.0.5

x7chat x7 chat 2.0.5.1

x7chat x7 chat 2.0.4.3

x7chat x7 chat 2.0.4.4

x7chat x7 chat 2.0.4

x7chat x7 chat 2.0.4.1

Exploits

## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient include Msf::Exploit::PhpEXE def initialize(info = {}) super(update_i ...