Webglimpse, a web site search application, contains a command injection vulnerability.
webglimpse.cgi script contains a command injection vulnerability. An attacker can use a specifically crafted
query URL parameter to run system commands. The results of the command will be displayed in the resulting web page.
An example of the
query parameter is below:
It has been reported that this vulnerability is being exploited in the wild.
An attacker may be able to run operating system commands under the context of the user running the web server. It has been reported that attackers are leveraging this vulnerability to install PHP backdoors on affected web servers.
Apply an Update
Webglimpse version 2.20.0 has been released to address this vulnerability.
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Notified: February 14, 2012 Updated: March 20, 2012
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Group | Score | Vector
Base | 5 | AV:N/AC:--/Au:N/C:C/I:C/A:P
Temporal | 4.3 | E:H/RL:OF/RC:C
Environmental | 4.3 | CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND
Thanks to Kevin Perry for reporting this vulnerability.
This document was written by Jared Allar.
CVE IDs: | None
Severity Metric: | 3.38
Date Public: | 2012-03-20
Date First Published: | 2012-03-20
Date Last Updated: | 2012-03-27 20:22 UTC
Document Revision: | 26