Description
IRC Xchat client versions 1.4.2 and earlier allows remote attackers to execute arbitrary commands by encoding shell metacharacters into a URL which XChat uses to launch a web browser.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by zenith parsec · textremotelinux
https://www.exploit-db.com/exploits/20161
References (5)
Core 5
Core References
Vendor Advisory mailing-list
x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2000-08/0215.html
Vendor Advisory vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/1601
Vendor Advisory mailing-list
x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2000-08/0305.html
Vendor Advisory vendor-advisory
x_refsource_redhat
http://www.redhat.com/support/errata/RHSA-2000-055.html
Vendor Advisory mailing-list
x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2000-08/0301.html
Scores
EPSS
0.0860
EPSS Percentile
92.4%
Details
Status
published
Products (11)
xchat/xchat
1.2.1
xchat/xchat
1.3.9
xchat/xchat
1.3.10
xchat/xchat
1.3.11
xchat/xchat
1.3.12
xchat/xchat
1.3.13
xchat/xchat
1.4
xchat/xchat
1.4.1
xchat/xchat
1.4.2
xchat/xchat
1.5.6
... and 1 more
Published
Oct 20, 2000
Tracked Since
Feb 18, 2026