Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Commerce)  > Vendors:'s eshop Commerce System Lets Remote Users Execute Arbitrary Commands on the System and Gain Shell Access
SecurityTracker Alert ID:  1002427
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Sep 19 2001
Impact:   Execution of arbitrary code via network, User access via network
Exploit Included:  Yes  

Description:   An input validation vulnerability was reported in's eshop commerce script. Remote users can execute commands on the web server.

It was reported that the script does not filter certain characters, so a remote user can supply the server with a ';' character followed by shell commands, causing those commands to be executed.

An example URL that will trigger the vulnerability and list files in the cgi-bin directory is provided:


Impact:   A remote user can execute arbitrary commands on the server with the privileges of the web server.
Solution:   No solution was available at the time of this entry.
Vendor URL: (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   None.

 Source Message Contents

Subject:  advisory

                    ------------[ advisory ]------------

name: (e)shop Online-Shop System

WEBDISCOUNT, Inh. Michael Boehme

Script doesnt check for symbol ";". any user 
can execute any *nix commands on webserver.



Bug found by Kernel|X| 
 [ twisted metal ]

E-Mail: [] 
WWW:     [ ]

Thank you for using Anonymous mail system! message sent from


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2022, LLC