|Category:||Web application abuses|
|Summary:||One of the BizDB scripts, bizdb-search.cgi, passes a variable's; contents to an unchecked open() call and can therefore be made to execute commands at the privilege; level of the webserver.|
One of the BizDB scripts, bizdb-search.cgi, passes a variable's
contents to an unchecked open() call and can therefore be made to execute commands at the privilege
level of the webserver.
The variable is dbname, and if passed a semicolon followed by shell
commands they will be executed. This cannot be exploited from a browser, as the software checks for
a referrer field in the HTTP request. A valid referrer field can however be created and sent
programmatically or via a network utility like netcat.
No known solution was made available for at least one year
since the disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features,
remove the product or replace the product by another one.
BugTraq ID: 1104|
Common Vulnerability Exposure (CVE) ID: CVE-2000-0287
Bugtraq: 20000412 BizDB Search Script Enables Shell Command Execution at the Server (Google Search)
XForce ISS Database: http-cgi-bizdb
|Copyright||Copyright (C) 2000 Roelof Temmingh |
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.