CVE-2007-1394

Flat Chat 2.0 - Code Injection

Title source: llm
STIX 2.1

Description

Direct static code injection vulnerability in startsession.php in Flat Chat 2.0 allows remote attackers to execute arbitrary PHP code via the Chat Name field, which is inserted into online.txt and included by users.php. NOTE: some of these details are obtained from third party information.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Dj7xpl · textwebappsphp
https://www.exploit-db.com/exploits/3428

References (6)

Core 6
Core References
Exploit, Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/24433
Exploit, Vendor Advisory vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/22865
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2007/0871
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/3428
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/33890
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/32882

Scores

EPSS 0.1075
EPSS Percentile 93.4%

Details

Status published
Products (1)
flat_chat/flat_chat 2.0
Published Mar 10, 2007
Tracked Since Feb 18, 2026