| VID |
21356 |
| Severity |
40 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The CVSTrac installed on the Web server, according to its version number, has a 'filediff' Remote Command Execution Vulnerability. CVSTrac is a Web-based bug and patch tracking system for CVS (Concurrent Version Service). CVSTrac version 1.1.3 and earlier are vulnerable to a Command Execution Vulnerability in the 'filediff' functionality, caused by a failure to properly sanitize input to the "rcsinfo" parameter of the "filediff" command. By sending a specially-crafted request containing the malicious "rcsinfo" parameter, a remote attacker could execute arbitrary commands on the server.
* Note: This check solely relied on the version number of the remote CVSTrac installed on the web server to assess this vulnerability, so this might be a false positive.
* References: http://www.osvdb.org/displayvuln.php?osvdb_id=8373 http://www.securitytracker.com/alerts/2004/Aug/1010880.html
* Platforms Affected: Open Source Development, CVSTrac 1.1.0, 1.1,1 1.1.2, 1.1.3 OpenPKG 2.0, 2.1, CURRENT Linux Any version Unix Any version |
| Recommendation |
Upgrade to the latest version of CVSTrac (1.1.4 or later) from the CVSTrac Download site at http://www.cvstrac.org/cvstrac/wiki?p=DownloadCvstrac
For OpenPKG: Upgrade to the latest cvstrac package, as listed in OpenPKG Security Advisory OpenPKG-SA-2004.036 at http://www-1.ibm.com/services/continuity/recover1.nsf/mss/MSS-OAR-E01-2004.1161.2 |
| Related URL |
CVE-2004-1456 (CVE) |
| Related URL |
10878 (SecurityFocus) |
| Related URL |
16929 (ISS) |
|