| VID |
21623 |
| Severity |
40 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The e107 eTrace plugin is vulnerable to a remote command execution vulnerability. e107 is a freely available, Web content management system written in PHP. eTrace is a traceroute utility plugin for e107. eTrace plugin versions 1.x prior to 1.02 could allow a remote attacker to execute arbitrary shell commands, caused by improper validation of user-supplied input in the doping.php script. By sending a specially-crafted POST request containing shell commands in the etrace_cmd or the etrace_host parameter of the doping.php script, a remote attacker could execute arbitrary shell commands on the affected host with privileges of the Web server.
* References: http://www.e107faq.org/download.php?view.309 http://secunia.com/advisories/15678/
* Platforms Affected: e107.org, eTrace plugin versions 1.x prior to 1.02 Any operating system Any version |
| Recommendation |
Upgrade to the latest version of eTrace plugin (1.02 or later), available from the e107 Web page at http://www.e107.org |
| Related URL |
CVE-2005-1966 (CVE) |
| Related URL |
8273 (SecurityFocus) |
| Related URL |
12739 (ISS) |
|