Vulnerabilities > CVE-2006-2156 - Unspecified vulnerability in X7 Group X7 Chat
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Directory traversal vulnerability in help/index.php in X7 Chat 2.0 and earlier allows remote attackers to include arbitrary files via .. (dot dot) sequences in the help_file parameter.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 6 |
Exploit-Db
description | X7 Chat <= 2.0 (help_file) Remote Commands Execution Exploit. CVE-2006-2156. Webapps exploit for php platform |
file | exploits/php/webapps/1738.php |
id | EDB-ID:1738 |
last seen | 2016-01-31 |
modified | 2006-05-02 |
platform | php |
port | |
published | 2006-05-02 |
reporter | rgod |
source | https://www.exploit-db.com/download/1738/ |
title | X7 Chat <= 2.0 help_file Remote Commands Execution Exploit |
type | webapps |
Nessus
NASL family | CGI abuses |
NASL id | X7CHAT_HELP_FILE_FILE_INCLUDE.NASL |
description | The remote host is running X7 Chat, a web-based chat program written in PHP. The version of X7 Chat installed on the remote host fails to properly sanitize input to the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 21312 |
published | 2006-05-03 |
reporter | This script is Copyright (C) 2006-2018 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/21312 |
title | X7 Chat help/index.php help_file Parameter Local File Inclusion |
code |
|
References
- http://secunia.com/advisories/19886
- http://secunia.com/advisories/19886
- http://securityreason.com/securityalert/829
- http://securityreason.com/securityalert/829
- http://www.osvdb.org/25149
- http://www.osvdb.org/25149
- http://www.securityfocus.com/archive/1/432716/100/0/threaded
- http://www.securityfocus.com/archive/1/432716/100/0/threaded
- http://www.securityfocus.com/bid/17777
- http://www.securityfocus.com/bid/17777
- http://www.vupen.com/english/advisories/2006/1608
- http://www.vupen.com/english/advisories/2006/1608
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26218
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26218
- https://www.exploit-db.com/exploits/1738
- https://www.exploit-db.com/exploits/1738