Summary
BizDB is a web database integration product
using Perl CGI scripts. One of the scripts,
bizdb-search.cgi, passes a variable's
contents to an unchecked open() call and
can therefore be made to execute commands
at the privilege level of the webserver.
The variable is dbname, and if passed a
semicolon followed by shell commands they
will be executed. This cannot be exploited
from a browser, as the software checks for
a referrer field in the HTTP request. A
valid referrer field can however be created
and sent programmatically or via a network
utility like netcat.
see also : http://www.hack.co.za/daem0n/cgi/cgi/bizdb.htm
Severity
Classification
-
CVE CVE-2000-0287 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Advantech Studio 'NTWebServer.exe' Directory Traversal Vulnerability
- Agora CGI Cross Site Scripting
- Apple Safari PDF Javascript Security Bypass Bypass Vulnerability
- Adiscon LogAnalyzer Multiple SQL Injection and XSS Vulnerabilities
- Awstats Configuration File Remote Arbitrary Command Execution Vulnerability