header-logo
Suggest Exploit
vendor:
WWW Authorization Gateway
by:
Ray Chan
7,5
CVSS
HIGH
Command Injection
78
CWE
Product Name: WWW Authorization Gateway
Affected Version From: 1.0
Affected Version To: 1.0
Patch Exists: YES
Related CWE: N/A
CPE: WWW Authorization Gateway
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2002

WWW Authorization Gateway Program Vulnerability

WWW Authorization Gateway program written by Ray Chan fails to eliminate characters with special meaning to the shell prior to executing a command. As a result, an attacker can utilize certain characters to execute arbitrary commands on a system remotely, as whatever user invoked the cgi-bin.

Mitigation:

Ensure that all user-supplied input is properly sanitized and validated before being used in any system command.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/152/info

A vulnerability exists in the WWW Authorization Gateway program written by Ray Chan. Version 1.0 fails to eliminate characters with special meaning to the shell prior to executing a command. As a result, an attacker can utilize certain characters to execute arbitrary commands on a system remotely, as whatever user invoked the cgi-bin.

Place the following as a username: 
| some command 
and any password. The command will be executed.