Leif M. Wright Web Blog远程命令执行漏洞

Leif M. Wright Web Blog远程命令执行漏洞

漏洞ID 1107670 漏洞类型 输入验证
发布时间 2004-01-31 更新时间 2005-10-20
图片[1]-Leif M. Wright Web Blog远程命令执行漏洞-安全小百科CVE编号 CVE-2004-2347
图片[2]-Leif M. Wright Web Blog远程命令执行漏洞-安全小百科CNNVD-ID CNNVD-200412-648
漏洞平台 CGI CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/23629
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200412-648
|漏洞详情
LeifM.WrightWebBlog1.1版本及1.1.5版本的blog.cgi存在漏洞。远程攻击者可以借助shell元字符,例如ViewFile请求的文件参数中的’|’,执行任意命令。
|漏洞EXP
source: http://www.securityfocus.com/bid/9539/info

Web Blog has been reported to be prone to a vulnerability that may permit remote attackers to execute arbitrary commands in the context of the hosting web server. This is due to insufficient sanitization of shell metacharacters from variables which will be used as an argument to a function that invokes the shell directly.

http://www.example.com/directory/blog.cgi?submit=ViewFile&month=[month]&year=[year]&file=|command|
|参考资料

来源:XF
名称:webblog-file-command-execution(15019)
链接:http://xforce.iss.net/xforce/xfdb/15019
来源:BID
名称:9539
链接:http://www.securityfocus.com/bid/9539
来源:BUGTRAQ
名称:20040129WebBlog1.1RemoteExecuteCommandsBug
链接:http://www.securityfocus.com/archive/1/352303
来源:SECUNIA
名称:10776
链接:http://secunia.com/advisories/10776/
来源:OSVDB
名称:3793
链接:http://www.osvdb.org/3793
来源:leifwright.com
链接:http://leifwright.com/scripts/Blog.html

相关推荐: DXFScope Remote Client-Side Buffer Overflow Vulnerability

DXFScope Remote Client-Side Buffer Overflow Vulnerability 漏洞ID 1097519 漏洞类型 Input Validation Error 发布时间 2004-12-16 更新时间 2004-12-16…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享