Vulnerabilities > CVE-2007-2149 - Remote Security vulnerability in Chatness

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
stephen-craton
critical
exploit available

Summary

Stephen Craton (aka WiredPHP) Chatness 2.5.3 and earlier stores usernames and unencrypted passwords in (1) classes/vars.php and (2) classes/varstuff.php, and recommends 0666 or 0777 permissions for these files, which allows local users to gain privileges by reading the files, and allows remote attackers to obtain credentials via a direct request for admin/options.php.

Vulnerable Configurations

Part Description Count
Application
Stephen_Craton
1

Exploit-Db

descriptionChatness <= 2.5.3 (options.php/save.php) Remote Code Execution Exploit. CVE-2007-2147,CVE-2007-2148,CVE-2007-2149. Webapps exploit for php platform
idEDB-ID:3725
last seen2016-01-31
modified2007-04-12
published2007-04-12
reporterGammarays
sourcehttps://www.exploit-db.com/download/3725/
titleChatness <= 2.5.3 options.php/save.php Remote Code Execution Exploit