发布时间 :1999-11-09 00:00:00
修订时间 :2008-09-09 08:36:35

[原文]Whois Internic Lookup program whois.cgi allows remote attackers to execute commands via shell metacharacters in the domain entry.

[CNNVD]Multiple Vendor whois CGI元字符漏洞(CNNVD-199911-034)

        Whois Internic Lookup 程序whois.cgi存在漏洞。远程攻击者可以通过域入口的shell元字符执行任意命令。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源

- 漏洞信息

Multiple Vendor whois CGI元字符漏洞
高危 输入验证
1999-11-09 00:00:00 2005-10-20 00:00:00
        Whois Internic Lookup 程序whois.cgi存在漏洞。远程攻击者可以通过域入口的shell元字符执行任意命令。

- 公告与补丁

        Update your script to one of the current versions. (See References)

- 漏洞信息

Whois Internic Lookup whois.cgi Domain Entry Arbitrary Command Execution
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

Ranson Johnson's Whois Internic Lookup CGI contains a flaw that may allow a malicious user to execute arbitrary command. The issue is due to the "whois.cgi" script not properly sanitizing shell metacharacters in the domain entry field. By sending a specially crafted domain request, a remote attacker can run any command on the system with the same privileges as the CGI program.

- 时间线

1999-11-09 Unknow
1999-11-09 Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者

- 漏洞信息

Multiple Vendor whois CGI Metacharacter Vulnerability
Input Validation Error 2000
Yes Yes
1999-11-09 12:00:00 2009-07-11 03:56:00
Posted to BugTraq on November 9, 1999 by Cody T. - hhp <>

- 受影响的程序版本

CGI City CC Whois 1.0

- 漏洞讨论

Whois scripts provide InterNIC lookup services via HTTP. The vulnerable scripts include versions of Matt's Whois and CGI City Whois. Older versions of these fail to filter metacharacters, allowing execution of arbitrary commands by embedding the commands in the domain name to lookup. Specifically, the UNIX command separation character ";" can be used to execute commands. Successful exploitation of this vulnerability would allow an attacker to execute commands with the privileges of the web server process, which could result in retrieval of sensitive information, web defacements, etc.

- 漏洞利用

Depending on the specific script used, the following syntaxes have been shown to allow intrusion:

1) ;command
2) ";command
3) ;command;

- 解决方案

Update your script to one of the current versions. (See References)

- 相关参考