vendor:
FreeWnn
by:
UNYUN
7.5
CVSS
HIGH
Command Execution
78
CWE
Product Name: FreeWnn
Affected Version From: 1.1.2000
Affected Version To: 1.1.2000
Patch Exists: YES
Related CWE: N/A
CPE: a:freewnn:freewnn:1.1.0
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: IRIX6.5 WorldView Janapese
2002
FreeWnn 1.1.0 Command Execution Vulnerability
FreeWnn 1.1.0 is a kana-kanji (japanese) translation system. This software is a client-server type application, with the jserver portion acting as a server and performing translations for clients. The jserver component passes unsanitized input from the client via the JS_MKDIR command to a system() libcall, allowing arbitrary command execution with the semi-colon ';' command separation metacharacter. Commands sent in this manner will be executed at the privilege level of the jserver process.
Mitigation:
Input validation should be performed to detect and reject malicious input.