发布时间 :2005-05-16 00:00:00
修订时间 :2016-10-17 23:19:19

[原文]Pico Server (pServ) 3.2 and earlier allows remote attackers to execute arbitrary commands via a URL with multiple leading "/" (slash) characters and ".." sequences.

[CNNVD]Pico Server远程命令注入漏洞(CNNVD-200505-1049)

        Pico Server是一款小型的Web服务器。
        Pico Server对用户请求的路径字串处理上存在漏洞,远程攻击者可能利用此漏洞在主机上执行任意命令。

- CVSS (基础分值)

CVSS分值: 10 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  FULLDISC  20050516 Advisory: Pico Server (pServ) Remote Command Injection
(UNKNOWN)  BID  13642

- 漏洞信息

Pico Server远程命令注入漏洞
危急 设计错误
2005-05-16 00:00:00 2006-05-12 00:00:00
        Pico Server是一款小型的Web服务器。
        Pico Server对用户请求的路径字串处理上存在漏洞,远程攻击者可能利用此漏洞在主机上执行任意命令。

- 公告与补丁


- 漏洞信息

Pico Server (pServ) Traversal Arbitrary Command Execution
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

pServ contains a flaw that allows a remote attacker to execute arbitrary commands outside of the web path. The issue is due to the server not properly sanitizing user input, specifically traversal style attacks (../../) supplied via the URI.

- 时间线

2005-05-16 2005-04-29
2005-05-16 Unknow

- 解决方案

Upgrade to version 3.3 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

Pserv Directory Traversal Vulnerability
Design Error 13642
Yes No
2005-05-16 12:00:00 2009-07-12 02:56:00
Discovered by Claus R. F. Overbeck <>.

- 受影响的程序版本

Pserv Pserv 3.2
Pserv Pserv 3.3

- 不受影响的程序版本

Pserv Pserv 3.3

- 漏洞讨论

pServ is prone to a directory traversal vulnerability. This occurs because the application does not implement a proper method for filtering directory traversal sequences from URIs. Since this can be done from the cgi-bin directory, it is possible to execute commands to which the Web server has permission.

This issue was reported to affect pServ version 3.2; earlier versions are like vulnerable.

- 漏洞利用

An exploit is not required. The following proof of concept demonstration was supplied:

The following url downloads a script (or executable) to the server:

This is how the script can be executed afterwards:

- 解决方案

This issue was addressed in pServ 3.3:

Pserv Pserv 3.2

- 相关参考