module
X7 Chat 2.0.5 lib/message.php preg_replace() PHP Code Execution
Disclosed | Created |
---|---|
2014-10-27 | 2018-05-30 |
Disclosed
2014-10-27
Created
2018-05-30
Description
This module exploits a post-auth vulnerability found in X7 Chat versions
2.0.0 up to 2.0.5.1. The vulnerable code exists on lib/message.php, which
uses preg_replace() function with the /e modifier. This allows a remote
authenticated attacker to execute arbitrary PHP code in the remote machine.
2.0.0 up to 2.0.5.1. The vulnerable code exists on lib/message.php, which
uses preg_replace() function with the /e modifier. This allows a remote
authenticated attacker to execute arbitrary PHP code in the remote machine.
Authors
Fernando Munoz fernando@null-life.com
Juan Escobar eng.jescobar@gmail.com
Juan Escobar eng.jescobar@gmail.com
Platform
PHP
Architectures
php
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.