XChat Client URL Metacharacter Command Execution

Medium Nessus Network Monitor Plugin ID 1876

Synopsis

The remote host is vulnerable to an flaw which allows attackers to execute arbitrary commands.

Description

The remote host is running the XChat IRC client. XChat IRC client versions 1.3.9 and later could allow an attacker to execute arbitrary shell commands. By embedding commands enclosed in backticks in URLs sent to XChat, a remote attacker can execute commands as the user.

Solution

Upgrade or patch according to vendor recommendations.

Plugin Details

Severity: Medium

ID: 1876

File Name: 1876.prm

Family: IRC Clients

Published: 2004/08/20

Modified: 2016/01/21

Dependencies: 1878

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 6.4

Temporal Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

Temporal Vector: CVSS2#E:H/RL:U/RC:ND

CVSSv3

Base Score: 6.5

Temporal Score: 6.5

Vector: CVSS3#AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

Temporal Vector: CVSS3#E:H/RL:O/RC:C

Reference Information

CVE: CVE-2000-0787

BID: 1601

OSVDB: 1524