发布时间 :2001-09-15 00:00:00
修订时间 :2017-12-18 21:29:30

[原文] in WebDiscount(e)shop allows remote attackers to execute arbitrary commands via shell metacharacters in the seite parameter.

[CNNVD]WebDiscount E-Shop 远程任意命令执行漏洞(CNNVD-200109-053)

        CVE(CAN) ID: CAN-2001-1014
        Webdiscount E-Shop是一个商业的在线购物系统,是由Michael Boehme开发和维护的。
        导致远程攻击者可能在该服务器上以Web Server权限执行任意命令。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(VENDOR_ADVISORY)  BUGTRAQ  20010915 advisory
(UNKNOWN)  XF  eshop-script-execute-commands(7128)

- 漏洞信息

WebDiscount E-Shop 远程任意命令执行漏洞
高危 输入验证
2001-09-15 00:00:00 2005-10-20 00:00:00
        CVE(CAN) ID: CAN-2001-1014
        Webdiscount E-Shop是一个商业的在线购物系统,是由Michael Boehme开发和维护的。
        导致远程攻击者可能在该服务器上以Web Server权限执行任意命令。

- 公告与补丁



- 漏洞信息

WebDiscount seite Parameter Arbitrary Command Execution

- 漏洞描述

Unknown or Incomplete

- 时间线

2001-09-15 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

WebDiscount E-Shop Remote Arbitrary Command Execution Vulnerability
Input Validation Error 3340
Yes No
2001-09-15 12:00:00 2009-07-11 07:56:00
This vulnerability was submitted to BugTraq on September 15th, 2001 by Kernel|X| <>.

- 受影响的程序版本

Michael Boehme WebDiscount E-Shop Online-Shop System 1.0

- 漏洞讨论

Webdiscount E-Shop Online Shop System is a web commerce application. It is written and maintained by Michael Boehme.

A problem exists in a default implementation of the software that may allow a user to potentially pass malicious input to the script. This is due insufficient sanitization from untrusted sources. For example, an attacker can use shell metacharacters(';', '|', etc.), which will allow arbitrary commands to be executed by the host with the privileges of the webserver process.

Successful exploitation of this issue may cause sensitive information to be disclosed to the attacker.

- 漏洞利用

This issue can be exploited with a web browser.

- 解决方案

Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: <>.

- 相关参考