Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.100443
Kategorie:Web Servers
Titel:Boa Webserver Terminal Escape Sequence in Logs Command Injection Vulnerability
Zusammenfassung:Boa Webserver is prone to a command-injection vulnerability because it; fails to adequately sanitize user-supplied input in logfiles.
Beschreibung:Summary:
Boa Webserver is prone to a command-injection vulnerability because it
fails to adequately sanitize user-supplied input in logfiles.

Vulnerability Impact:
Attackers can exploit this issue to execute arbitrary commands in
a terminal.

Affected Software/OS:
Boa Webserver 0.94.14rc21 is vulnerable, other versions may also
be affected.

Solution:
No known solution was made available for at least one year
since the disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features,
remove the product or replace the product by another one.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2009-4496
BugTraq ID: 37718
http://www.securityfocus.com/bid/37718
Bugtraq: 20100110 Nginx, Varnish, Cherokee, thttpd, mini-httpd, WEBrick, Orion, AOLserver, Yaws and Boa log escape sequence injection (Google Search)
http://www.securityfocus.com/archive/1/508830/100/0/threaded
http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041285.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041271.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041274.html
http://www.ush.it/team/ush/hack_httpd_escape/adv.txt
http://secunia.com/advisories/39775
http://www.vupen.com/english/advisories/2010/1133
CopyrightCopyright (C) 2010 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.