vendor:
WebWho+
by:
loophole of hhp
7.5
CVSS
HIGH
Remote Command Execution
78
CWE
Product Name: WebWho+
Affected Version From: WebWho+ v1.1
Affected Version To: WebWho+ v1.1
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
1999
WebWho+ v1.1 (whois cgi) remote exploit
WebWho+ is a free cgi script written by Tony Greenwood for executing whois queries via the www. Though it does perform checks for shell escape characters on some parameters, it misses the 'type' variable and allows for malicious input to be sent to a shell. It is possible to execute arbitrary commands on a webserver running WebWho+ v1.1 with the uid of the webserver (usually nobody).
Mitigation:
Perform checks for shell escape characters on all parameters.