A vulnerability has been identified in Voodoo Chat, which could be exploited by attackers to execute arbitrary commands. This flaw is due to input validation errors in various scripts (e.g. "index.php") that fail to properly validate the "file_path" parameter, which could be exploited by remote attackers to include malicious files and execute arbitrary commands with the privileges of the web server.
Vulnerable Products
Vulnerable Software: Voodoo chat version 1.0RC1b and prior