Description
Direct static code injection vulnerability in startsession.php in Flat Chat 2.0 allows remote attackers to execute arbitrary PHP code via the Chat Name field, which is inserted into online.txt and included by users.php. NOTE: some of these details are obtained from third party information.
Exploits (1)
References (6)
Core 6
Core References
Exploit, Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/24433
Exploit, Vendor Advisory vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/22865
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2007/0871
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/3428
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/33890
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/32882
Scores
EPSS
0.1075
EPSS Percentile
93.4%
Details
Status
published
Products (1)
flat_chat/flat_chat
2.0
Published
Mar 10, 2007
Tracked Since
Feb 18, 2026