vendor:
csSearch
by:
SecurityFocus
7.5
CVSS
HIGH
Remote Code Execution
78
CWE
Product Name: csSearch
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: a:cspublish:cssearch
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Unix, Linux, Microsoft
2002
csSearch Remote Code Execution Vulnerability
csSearch is a website search script, written in Perl. It is prone to an issue which may enable an attacker to execute Perl code with the privileges of the webserver process. For exploitation to be successful, the attacker must pass properly URL encoded Perl code in CGI parameters via a web request. For example, the classic 'rm -rf /' example would be as follows: csSearch.cgi?command=savesetup&setup=`rm%20-rf%20/`. Here's something a little more interesting, less than 300 bytes of code that turns csSearch into a remote web shell of sorts.
Mitigation:
Ensure that all user-supplied input is properly validated and sanitized before being used in any system operations.