CVE-2014-8998
20.11.2014, 13:55
lib/message.php in X7 Chat 2.0.0 through 2.0.5.1 allows remote authenticated users to execute arbitrary PHP code via a crafted HTTP header to index.php, which is processed by the preg_replace function with the eval switch.
Vendor | Product | Version |
---|---|---|
x7chat | x7_chat | 2.0.0 |
x7chat | x7_chat | 2.0.0:a1 |
x7chat | x7_chat | 2.0.0:a2 |
x7chat | x7_chat | 2.0.0:a3 |
x7chat | x7_chat | 2.0.0:b1 |
x7chat | x7_chat | 2.0.0:b2 |
x7chat | x7_chat | 2.0.1:a1 |
x7chat | x7_chat | 2.0.2 |
x7chat | x7_chat | 2.0.3 |
x7chat | x7_chat | 2.0.4 |
x7chat | x7_chat | 2.0.4.1 |
x7chat | x7_chat | 2.0.4.3 |
x7chat | x7_chat | 2.0.4.4 |
x7chat | x7_chat | 2.0.5 |
x7chat | x7_chat | 2.0.5.1 |
𝑥
= Vulnerable software versions
References