header-logo
Suggest Exploit
vendor:
Miyabi CGI Tools
by:
Unknown
7.5
CVSS
HIGH
Arbitrary Command Execution
78
CWE
Product Name: Miyabi CGI Tools
Affected Version From: 01.02
Affected Version To: Unknown
Patch Exists: NO
Related CWE:
CPE: a:miyabi_cgi_tools:miyabi_cgi_tools:1.02
Metasploit:
Other Scripts:
Platforms Tested: Unknown
Unknown

Arbitrary Command Execution in Miyabi CGI Tools

Attackers can execute arbitrary commands in the context of the Miyabi CGI Tools application by exploiting a failure in input sanitization. This can lead to compromise of the application and potentially the underlying computer.

Mitigation:

Implement proper input sanitization and validation techniques to prevent command execution vulnerabilities. Ensure that user-supplied input is properly sanitized before being used in system commands or queries.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/41228/info

Miyabi CGI Tools is prone to a vulnerability that attackers can leverage to execute arbitrary commands in the context of the application. This issue occurs because the application fails to adequately sanitize user-supplied input.

Successful attacks can compromise the affected application and possibly the underlying computer.

Miyabi CGI Tools 1.02 is vulnerable; other versions may also be affected.

http://www.example.com/index.pl?mode=html&fn=|uname%20-a|