Korean
<< Back
VID 21772
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Looking Glass is vulnerable to a command execution vulnerability via the target parameter. Looking Glass provides a Web interface written a CGI script to various network utilities such as ping, traceroute, and whois. Looking Glass versions 20040427 and 1.0 is vulnerable to multiple vulnerabilities, which can be exploited by a remote attacker to conduct cross-site scripting attacks and compromise a vulnerable system.

1) Input passed to the "version" array parameter in footer.php and header.php is not properly sanitized before being returned to users. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
2) Input passed to the "target" parameter in lg.php is not properly sanitized before being used in a "system()" call. This can be exploited to inject arbitrary shell commands via e.g. the "|" pipe character.

* References:
http://rgod.altervista.org/lookingglass.html
http://archives.neohapsis.com/archives/bugtraq/2005-08/0381.html
http://de-neef.net/articles.php?id=2&page=1
http://secunia.com/advisories/16607/

* Platforms Affected:
Intermedia Communications (formerly Digex), Looking Glass 20040427
Intermedia Communications (formerly Digex), Looking Glass 1.0
Any operating system Any version
Recommendation No upgrade or patch available as of June 2014.

Edit the source code to ensure that input is properly sanitized.
Related URL CVE-2005-2776,CVE-2005-2777 (CVE)
Related URL 14680,14682 (SecurityFocus)
Related URL 22044,22045 (ISS)