CVE-2001-0937
CVSS7.5
发布时间 :2001-11-30 00:00:00
修订时间 :2016-10-17 22:13:36
NMCOS    

[原文]PGPMail.pl 1.31 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) recipient or (2) pgpuserid parameters.


[CNNVD]PGPMail远程命令执行漏洞(CNNVD-200111-056)

        PGPMail.pl 1.31版本存在漏洞。远程攻击者借助(1)recipient 或者(2)pgpuserid参数的shell元字符执行任意命令。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0937
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-0937
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200111-056
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=100714269114686&w=2
(UNKNOWN)  BUGTRAQ  20011130 Vulnerabilities in PGPMail.pl
http://www.securityfocus.com/archive/82/243262
(VENDOR_ADVISORY)  VULN-DEV  20011129 PGPMail.pl possible remote command execution

- 漏洞信息

PGPMail远程命令执行漏洞
高危 输入验证
2001-11-30 00:00:00 2005-10-20 00:00:00
远程  
        PGPMail.pl 1.31版本存在漏洞。远程攻击者借助(1)recipient 或者(2)pgpuserid参数的shell元字符执行任意命令。

- 公告与补丁

        Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com .

- 漏洞信息

11968
PGPMail.pl Multiple Parameter Arbitrary Command Execution

- 漏洞描述

Unknown or Incomplete

- 时间线

2001-11-29 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

PGPMail Remote Command Execution Vulnerability
Input Validation Error 3605
Yes No
2001-11-30 12:00:00 2009-07-11 09:06:00
This vulnerability was originally submitted to BugTraq by John Scimone <jscimone@cc.gatech.edu> on November 29th, 2001.

- 受影响的程序版本

PGPMail PGPMail 1.3.1
+ Matt Wright FormMail 1.6
+ Matt Wright FormMail 1.5
PGPMail PGPMail 1.3 00
+ Matt Wright FormMail 1.5

- 漏洞讨论

PGPMail is a modified version of Matt Wright's FormMail 1.5, allowing mail to be encrypted using PGP.

PGPMail is prone to a vulnerability which may allow arbitrary commands to be executed on the shell of a host running it. Commands will be executed with the privileges of the webserver. There are at least two instances in the PGPMail.pl script where shell metacharacters are not adequately filtered from hidden form fields(recipient and pgpuserid).

Although PGPMail does include the security feature of checking the HTTP Referrer against a list of hosts, this vulnerability could be trivially exploited if the HTTP Referrer field of a web request is forged by the attacker.

- 漏洞利用

There is no exploit code required.

- 解决方案

Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站