kicq IRC Client URL Shell Metacharacter Arbitrary Command Execution

2001-02-14T07:46:10
ID OSVDB:6029
Type osvdb
Reporter Marc Roessler(marc@tentacle.franken.de)
Modified 2001-02-14T07:46:10

Description

Vulnerability Description

It is possible to send a malformed link to kicq that when clicked is passed to system() without being sanitized. By passing shell characters as a part of the link it's entirely possible to compromise the user account that is running kicq.

Solution Description

There is no published solution for this vulnerability in kicq, it's wise to use another package that has similar functionality. There are no known upgrades to fix this problem.

Short Description

It is possible to send a malformed link to kicq that when clicked is passed to system() without being sanitized. By passing shell characters as a part of the link it's entirely possible to compromise the user account that is running kicq.

References:

Vendor URL: http://sourceforge.net/projects/kicq/ Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2001-02/0276.html Keyword: icq Keyword: kicq ISS X-Force ID: 6112 CVE-2001-0274