Jason Maloney Guestbook Arbitrary Command Execution
2003-12-01T04:23:29
ID OSVDB:2889 Type osvdb Reporter OSVDB Modified 2003-12-01T04:23:29
Description
Vulnerability Description
The vulnerability occurs in the routine that reads and converts user input from hexidecimal. The routine assigns values to all variable names accordingly as specified in the HTTP POST request (guestbook posts are POSTed). An attacker can send a hand crafted POST request which will execute arbitrary commands on the server.
Solution Description
Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workaround(s): Replace the vulnerable code in the guestbook so that it checks the values of the important variables after user input. Sample code is available.
Short Description
The vulnerability occurs in the routine that reads and converts user input from hexidecimal. The routine assigns values to all variable names accordingly as specified in the HTTP POST request (guestbook posts are POSTed). An attacker can send a hand crafted POST request which will execute arbitrary commands on the server.
References:
Secunia Advisory ID:10336
Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2003-11/0356.html
ISS X-Force ID: 13886
Bugtraq ID: 9139
{"title": "Jason Maloney Guestbook Arbitrary Command Execution ", "published": "2003-12-01T04:23:29", "references": [], "type": "osvdb", "enchantments": {"score": {"value": 1.0, "vector": "NONE", "modified": "2017-04-28T13:19:57", "rev": 2}, "dependencies": {"references": [], "modified": "2017-04-28T13:19:57", "rev": 2}, "vulnersScore": 1.0}, "cvelist": [], "viewCount": 0, "affectedSoftware": [{"version": "0.x", "name": "Guestbook", "operator": "eq"}, {"version": "3.0", "name": "Guestbook", "operator": "eq"}, {"version": "2.x", "name": "Guestbook", "operator": "eq"}, {"version": "1.x", "name": "Guestbook", "operator": "eq"}], "id": "OSVDB:2889", "modified": "2003-12-01T04:23:29", "href": "https://vulners.com/osvdb/OSVDB:2889", "edition": 1, "description": "## Vulnerability Description\nThe vulnerability occurs in the routine that reads and converts user input from hexidecimal. The routine assigns values to all variable names accordingly as specified in the HTTP POST request (guestbook posts are POSTed). An attacker can send a hand crafted POST request which will execute arbitrary commands on the server.\n## Solution Description\nCurrently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workaround(s): Replace the vulnerable code in the guestbook so that it checks the values of the important variables after user input. Sample code is available.\n## Short Description\nThe vulnerability occurs in the routine that reads and converts user input from hexidecimal. The routine assigns values to all variable names accordingly as specified in the HTTP POST request (guestbook posts are POSTed). An attacker can send a hand crafted POST request which will execute arbitrary commands on the server.\n## References:\n[Secunia Advisory ID:10336](https://secuniaresearch.flexerasoftware.com/advisories/10336/)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2003-11/0356.html\nISS X-Force ID: 13886\nBugtraq ID: 9139\n", "bulletinFamily": "software", "reporter": "OSVDB", "cvss": {"vector": "NONE", "score": 0.0}, "lastseen": "2017-04-28T13:19:57"}