iOffice 0.1 Remote Command Execution

2010-07-18T00:00:00
ID PACKETSTORM:91947
Type packetstorm
Reporter Marshall Whittaker
Modified 2010-07-18T00:00:00

Description

                                        
                                            `iOffice 0.1 is vulnerable because it does not sanitize user input. It seems  
to be modular because none of the scripts are exactly the same on ones I've  
run across, but they all seem to be vulnerable. Command execution is  
possible.  
  
www.example.com/cgi-bin/index.pl?section_name=whatever&section=ioffice&parametre=|id|  
  
I couldn't find exactly where this was distributed from, or who the author  
is, and it's not written in my native language, so if anyone knows, please  
let me know.  
`