Pngren 2.0.1 – ‘Kaiseki.cgi’ Remote Command Execution

Pngren 2.0.1 – ‘Kaiseki.cgi’ Remote Command Execution

漏洞ID 1055235 漏洞类型
发布时间 2005-07-07 更新时间 2005-07-07
图片[1]-Pngren 2.0.1 – ‘Kaiseki.cgi’ Remote Command Execution-安全小百科CVE编号 N/A
图片[2]-Pngren 2.0.1 – ‘Kaiseki.cgi’ Remote Command Execution-安全小百科CNNVD-ID N/A
漏洞平台 CGI CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/25952
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/14182/info

pngren is prone to a remote arbitrary command execution vulnerability.

Reportedly, this issue arises when the user-specified values are passed to the 'kaiseki.cgi' script. Due to this, an attacker can supply arbitrary commands and have them executed in the context of the server.

This issue may facilitate unauthorized remote access in the context of the Web server to the affected computer. 

http://www.example.com/cgi-bin/kaiseki.cgi?file.exetension|command|
http://www.example.com/cgi-bin/kaiseki.cgi?|command|

相关推荐: 121 Software 121 WAM! FTP Server Directory Traversal Vulnerability

121 Software 121 WAM! FTP Server Directory Traversal Vulnerability 漏洞ID 1099724 漏洞类型 Access Validation Error 发布时间 2003-08-06 更新时间 …

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享