OPeNDAP code execution vulnerability

ID VU:857153
Type cert
Reporter CERT
Modified 2007-05-18T00:00:00



OPeNDAP server version 3 contains a vulnerability that allows an attacker to execute comands on the server.


From the OPenNDAP website:

OPeNDAP provides software which makes local data accessible to remote locations regardless of local storage format. OPeNDAP also provides tools for transforming existing applications into OPeNDAP clients (i.e., enabling them to remotely access OPeNDAP served data).

A CGI script in OPeNDAP Version 3 (CGI_server) contains a vulnerability that allows an attacker to execute arbitrary commands on the server by supplying a malicious URL.


A remote, unauthenticated attacker may be able to execute arbitrary commands.


Apply a patch
The OPeNDAP team has released a patch to address this issue. Users are encouraged to apply the patch as soon as possible.


Server version 4 (Hyrax) does not have this vulnerability.

Restrict access

Until updates can be applied, restricting access to vulnerable servers via password protectected directories or IP access control lists may mitigate this vulnerability.

Systems Affected

Vendor| Status| Date Notified| Date Updated
OPeNDAP, Inc.| | -| 30 Apr 2007
If you are a vendor and your product is affected, let us know.

CVSS Metrics

Group | Score | Vector
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | N/A | N/A


  • <>
  • <>
  • <>
  • <>
  • <>


Thanks to the OPeNDAP team for information used in this report.

This document was written by Ryan Giobbi.

Other Information

  • CVE IDs: Unknown
  • Date Public: 14 May 2007
  • Date First Published: 30 Apr 2007
  • Date Last Updated: 18 May 2007
  • Severity Metric: 2.16
  • Document Revision: 18