OPeNDAP server version 3 contains a vulnerability that allows an attacker to execute comands on the server.
From the OPenNDAP website:
OPeNDAP provides software which makes local data accessible to remote locations regardless of local storage format. OPeNDAP also provides tools for transforming existing applications into OPeNDAP clients (i.e., enabling them to remotely access OPeNDAP served data).
A CGI script in OPeNDAP Version 3 (CGI_server) contains a vulnerability that allows an attacker to execute arbitrary commands on the server by supplying a malicious URL.
A remote, unauthenticated attacker may be able to execute arbitrary commands.
Apply a patch
The OPeNDAP team has released a patch to address this issue. Users are encouraged to apply the patch as soon as possible.
Server version 4 (Hyrax) does not have this vulnerability.
Until updates can be applied, restricting access to vulnerable servers via password protectected directories or IP access control lists may mitigate this vulnerability.
Vendor| Status| Date Notified| Date Updated
OPeNDAP, Inc.| | -| 30 Apr 2007
If you are a vendor and your product is affected, let us know.
Group | Score | Vector
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | N/A | N/A
Thanks to the OPeNDAP team for information used in this report.
This document was written by Ryan Giobbi.