vendor:
textcounter.pl
by:
pdoru@pop3.kappa.ro
7.5
CVSS
HIGH
Remote Command Execution
78
CWE
Product Name: textcounter.pl
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2002
textcounter.pl Remote Command Execution Vulnerability
textcounter.pl is distributed through Matt's Scripts archive, and provides added features to httpd servers such as counters, guestbooks, and http cookie management. Due to insufficient checking of entered characters, it is possible for a remote user to input custom formatted strings into the $DOCUMENT_URI environment variable which, which when parsed can be executed as the UID of the httpd process. This makes it possible for a user with malicious intentions to execute arbitrary commands, and potentially gain access to the local host.
Mitigation:
Input validation should be used to prevent malicious input from being passed to the application. The application should also be configured to run with the least privileges necessary.