{"exploitdb": [{"lastseen": "2016-02-02T17:13:48", "bulletinFamily": "exploit", "description": "Super Site Searcher Remote Command Execution Vulnerability. CVE-2002-2420. Webapps exploit for cgi platform", "modified": "2002-09-03T00:00:00", "published": "2002-09-03T00:00:00", "id": "EDB-ID:21768", "href": "https://www.exploit-db.com/exploits/21768/", "type": "exploitdb", "title": "Super Site Searcher Remote Command Execution Vulnerability", "sourceData": "source: http://www.securityfocus.com/bid/5605/info\r\n\r\nSuper Site Searcher is prone to remote command execution. Shell metacharacters are not adequately filtered from query string parameters in a request to the vulnerable search engine script. The parameters are then used in a function which passes commands directly through the shell.\r\n\r\nA remote attacker may exploit this condition to execute arbitrary commands on the shell with the privileges of the webserver process.\r\n\r\nSimple Site Searcher, released by the same vendor, is also prone to this issue. \r\n\r\nhttp://target/searchenginepath/site_searcher.cgi?page=|command| ", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/21768/"}]}