CVE-2001-0849
CVSS7.5
发布时间 :2001-12-06 00:00:00
修订时间 :2016-10-17 22:12:25
NMCOS    

[原文]viralator CGI script in Viralator 0.9pre1 and earlier allows remote attackers to execute arbitrary code via a URL for a file being downloaded, which is insecurely passed to a call to wget.


[CNNVD]Viralator CGI输入验证远程shell命令漏洞(CNNVD-200112-040)

        Viralator 0.9pre1及其更早版本的viralator CGI脚本存在漏洞。远程攻击者可以借助下载文件的URL执行任意代码,该漏洞会不安全传递wget的调用。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:duncan_hall:viralator:0.9_pre1
cpe:/a:duncan_hall:viralator:0.8
cpe:/a:duncan_hall:viralator:0.7

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0849
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-0849
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200112-040
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=100463639800515&w=2
(UNKNOWN)  BUGTRAQ  20011101 Vulnerability in Viralator proxy extension
http://viralator.loddington.com/changes.html
(VENDOR_ADVISORY)  MISC  http://viralator.loddington.com/changes.html
http://www.securityfocus.com/bid/3495
(PATCH)  BID  3495
http://xforce.iss.net/static/7440.php
(PATCH)  XF  viralator-cgi-command-execution(7440)

- 漏洞信息

Viralator CGI输入验证远程shell命令漏洞
高危 输入验证
2001-12-06 00:00:00 2005-10-20 00:00:00
远程  
        Viralator 0.9pre1及其更早版本的viralator CGI脚本存在漏洞。远程攻击者可以借助下载文件的URL执行任意代码,该漏洞会不安全传递wget的调用。

- 公告与补丁

        The vendor has released an upgrade which addresses this issue.
        Duncan Hall Viralator 0.7
        
        Duncan Hall Viralator 0.8
        
        Duncan Hall Viralator 0.9 pre1
        

- 漏洞信息

13981
Viralator viralator.cgi Arbitrary Command Execution
Remote / Network Access
Loss of Integrity Upgrade
Vendor Verified

- 漏洞描述

- 时间线

2001-11-01 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 0.9pre2 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Viralator CGI Input Validation Remote Shell Command Vulnerability
Input Validation Error 3495
Yes No
2001-08-10 12:00:00 2009-07-11 09:06:00
Discovered by Pekka Ahmavuo <pekka@netland.fi> and posted to the Viralator Developers Forum on August 10, 2001.

- 受影响的程序版本

Duncan Hall Viralator 0.9 pre1
Duncan Hall Viralator 0.8
Duncan Hall Viralator 0.7
Duncan Hall Viralator 0.9 pre2

- 不受影响的程序版本

Duncan Hall Viralator 0.9 pre2

- 漏洞讨论

Viralator is a Perl CGI script designed to work with the Squid proxy server. It works in conjunction with a virus scanning engine to scan all files downloaded through the proxy server.

Viralator passes a filename taken from the URL to two shell commands used to receive the file and to scan it. It does not validate or check this input, allowing a maliciously constructed URL to contain escaped shell commands. These commands will then be executed by the Viralator script.

- 漏洞利用

This vulnerability can be exploited with a web browser.

- 解决方案

The vendor has released an upgrade which addresses this issue.


Duncan Hall Viralator 0.7

Duncan Hall Viralator 0.8

Duncan Hall Viralator 0.9 pre1

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站