Korean
<< Back
VID 21808
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The PerlDesk program is vulnerable to a file inclusion vulnerability in the pdesk.cgi script. PerlDesk is a Web-based help desk and email management program written in perl. PerlDesk version 1.8 and earlier versions could allow a remote attacker to traverse directories on the Web server, caused by improper validation of user-supplied input passed to the lang parameter of the pdesk.cgi script. By sending a specially-crafted URL containing "dot dot" sequences (../) and null byte (%00), a remote attacker could read arbitrary files and possibly execute arbitrary Perl modules with the privileges of the Web service.

* References:
http://marc.theaimsgroup.com/?l=bugtraq&m=109509026406554&w=2
http://archives.neohapsis.com/archives/bugtraq/2004-09/0109.html
http://www.osvdb.org/9954
http://secunia.com/advisories/12512

* Platforms Affected:
LogicNow, PerlDesk version 1.8 and earlier versions
Any operating system Any version
Recommendation Upgrade to the latest version of PerlDesk (2 or later), available from the PerlDesk Web site at http://www.perldesk.com/
Related URL CVE-2004-1677,CVE-2004-1678 (CVE)
Related URL 11160 (SecurityFocus)
Related URL 17343,19712 (ISS)