Korean
<< Back
VID 21623
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The e107 eTrace plugin is vulnerable to a remote command execution vulnerability. e107 is a freely available, Web content management system written in PHP. eTrace is a traceroute utility plugin for e107. eTrace plugin versions 1.x prior to 1.02 could allow a remote attacker to execute arbitrary shell commands, caused by improper validation of user-supplied input in the doping.php script. By sending a specially-crafted POST request containing shell commands in the etrace_cmd or the etrace_host parameter of the doping.php script, a remote attacker could execute arbitrary shell commands on the affected host with privileges of the Web server.

* References:
http://www.e107faq.org/download.php?view.309
http://secunia.com/advisories/15678/

* Platforms Affected:
e107.org, eTrace plugin versions 1.x prior to 1.02
Any operating system Any version
Recommendation Upgrade to the latest version of eTrace plugin (1.02 or later), available from the e107 Web page at http://www.e107.org
Related URL CVE-2005-1966 (CVE)
Related URL 8273 (SecurityFocus)
Related URL 12739 (ISS)