SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   The Includer Vendors:   R3N3 Internet Services
The Includer Input Validation Hole Lets Remote Users Execute Arbitrary Commands
SecurityTracker Alert ID:  1013393
SecurityTracker URL:  http://securitytracker.com/id/1013393
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Mar 7 2005
Impact:   Execution of arbitrary code via network, User access via network
Exploit Included:  Yes  

Description:   A vulnerability was reported in The Includer script. A remote user can execute arbitrary commands on the target system.

The 'includer.cgi' script does not properly validate user supplied input. A remote user can provide a specially crafted URL to execute arbitrary operating system commands on the target system. The commands will run with the privileges of the target web service.

Some demonstration exploit URLs are provided:

http://[target]/includer.cgi?|id|

http://[target]/includer.cgi?template=|id|

Francisco Alisson reported this vulnerability.

Impact:   A remote user can execute arbitrary commands on the target system with the privileges of the target web service.
Solution:   No solution was available at the time of this entry.
Vendor URL:  www.smarterscripts.com/includer/ (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  Remote Command Execution




Remote Command Execution

Script: The Includer ( www.smarterscripts.com/includer/ )

Remote Command Execution on:

Example I.: www.host-vulnerable.com/includer.cgi?|id|
Example II.: www.host-vulnerable.com/includer.cgi?template=|id|

Sorry if the bug is already posted ;) 

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC