OPeNDAP server version 3 contains a vulnerability that allows an attacker to execute comands on the server.
From the OPenNDAP website:
OPeNDAP provides software which makes local data accessible to remote locations regardless of local storage format. OPeNDAP also provides tools for transforming existing applications into OPeNDAP clients (i.e., enabling them to remotely access OPeNDAP served data).
A CGI script in OPeNDAP Version 3 (CGI_server) contains a vulnerability that allows an attacker to execute arbitrary commands on the server by supplying a malicious URL.
A remote, unauthenticated attacker may be able to execute arbitrary commands.
Apply a patch
The OPeNDAP team has released a patch to address this issue. Users are encouraged to apply the patch as soon as possible.
Upgrade
Server version 4 (Hyrax) does not have this vulnerability.
Restrict access
Until updates can be applied, restricting access to vulnerable servers via password protectected directories or IP access control lists may mitigate this vulnerability.
Vendor| Status| Date Notified| Date Updated
---|---|---|---
OPeNDAP, Inc.| | -| 30 Apr 2007
If you are a vendor and your product is affected, let us know.
Group | Score | Vector
---|---|---
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | N/A | N/A
Thanks to the OPeNDAP team for information used in this report.
This document was written by Ryan Giobbi.