CVE-2016-2087

Published on: 01/18/2017 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:15 PM UTC

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

Certain versions of Hexchat from Hexchat Project contain the following vulnerability:

Directory traversal vulnerability in the client in HexChat 2.11.0 allows remote IRC servers to read or modify arbitrary files via a .. (dot dot) in the server name.

  • CVE-2016-2087 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 7.4 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK HIGH NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH NONE

CVSS2 Score: 6.8 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK MEDIUM NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL PARTIAL

CVE References

Description Tags Link
HexChat 'src/common/text.c' Directory Traversal Vulnerability cve.report (archive)
text/html
URL Logo BID 95881
Hexchat IRC Client 2.11.0 - Directory Traversal Exploit
Third Party Advisory
VDB Entry
www.exploit-db.com
Proof of Concept
text/html
URL Logo EXPLOIT-DB 39656
Hexchat IRC Client 2.11.0 Directory Traversal ≈ Packet Storm Exploit
Third Party Advisory
VDB Entry
packetstormsecurity.com
text/html
URL Logo MISC packetstormsecurity.com/files/136564/Hexchat-IRC-Client-2.11.0-Directory-Traversal.html

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationHexchat ProjectHexchat2.11.0AllAllAll
ApplicationHexchat ProjectHexchat2.11.0AllAllAll
  • cpe:2.3:a:hexchat_project:hexchat:2.11.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:hexchat_project:hexchat:2.11.0:*:*:*:*:*:*:*: