Korean
<< Back
VID 21743
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The WebGUI program is vulnerable to a command execution vulnerability in the class paramater. WebGUI is a content management system written in Perl, developed by PLAINBLACK Software. WebGUI versions 6.3.0 through 6.7.5 could allow a remote attacker to execute arbitrary system commands, caused by improper validation of user-supplied input passed to the class parameter of the index.pl script. A remote attacker could inject arbitrary commands to execute arbitrary shell commands on the system with privileges of the Web server process.

* References:
http://www.plainblack.com/getwebgui/advisories/security-exploit-patch-for-6.3-and-above
http://secunia.com/advisories/17158/

* Platforms Affected:
PLAINBLACK Software, WebGUI versions 6.3.0 through 6.7.5
Any operating system Any version
Recommendation Upgrade to the latest version of WebGUI (6.7.6 or later), available from the PLAINBLACK Software Web site at http://www.plainblack.com/webgui
Related URL CVE-2005-4694 (CVE)
Related URL 15083 (SecurityFocus)
Related URL 22730 (ISS)