Korean
<< Back
VID 21265
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description WebWho+ CGI script, webwho.pl is vulnerable to a remote execution vulnerability.
WebWho+ is a free XFI script written by Tony Greenwood for executing whois queries via the www. Though it does perform checks for shell escape characters on some parameters, it misses the 'type' variable and allows for malicious input to be sent to a shell. It could allow remote attackers to execute arbitrary commands on a webserver running WebWho+ v1.1 with the uid of the webserver (usually nobody).

* Platforms Affected:
WebWho+ 1.1

* References:
http://www.securityfocus.com/archive/1/39839
Recommendation Obtain and install the latest version of WebWho+ from the WebWho+ website at http://www.webwho.co.uk

WebWho+ author Tony Greenwood states that this issue was resolved within one week from the advisory release, and that the bug no longer appears in all scripts released after February 2000.
Related URL CVE-2000-0010 (CVE)
Related URL 3748 (SecurityFocus)
Related URL 892 (ISS)