Vulnerability Description
lib/message.php in X7 Chat 2.0.0 through 2.0.5.1 allows remote authenticated users to execute arbitrary PHP code via a crafted HTTP header to index.php, which is processed by the preg_replace function with the eval switch.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| X7Chat | X7 Chat | 2.0.0 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/128964/X7-Chat-2.0.5-lib-message.php-preg_rExploit
- http://www.exploit-db.com/exploits/35183Exploit
- http://www.securityfocus.com/bid/71014
- https://exchange.xforce.ibmcloud.com/vulnerabilities/98513
- http://packetstormsecurity.com/files/128964/X7-Chat-2.0.5-lib-message.php-preg_rExploit
- http://www.exploit-db.com/exploits/35183Exploit
- http://www.securityfocus.com/bid/71014
- https://exchange.xforce.ibmcloud.com/vulnerabilities/98513
FAQ
What is CVE-2014-8998?
CVE-2014-8998 is a vulnerability with a CVSS score of 6.5 (MEDIUM). lib/message.php in X7 Chat 2.0.0 through 2.0.5.1 allows remote authenticated users to execute arbitrary PHP code via a crafted HTTP header to index.php, which is processed by the preg_replace function...
How severe is CVE-2014-8998?
CVE-2014-8998 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-8998?
Check the references section above for vendor advisories and patch information. Affected products include: X7Chat X7 Chat.