VID |
21808 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The PerlDesk program is vulnerable to a file inclusion vulnerability in the pdesk.cgi script. PerlDesk is a Web-based help desk and email management program written in perl. PerlDesk version 1.8 and earlier versions could allow a remote attacker to traverse directories on the Web server, caused by improper validation of user-supplied input passed to the lang parameter of the pdesk.cgi script. By sending a specially-crafted URL containing "dot dot" sequences (../) and null byte (%00), a remote attacker could read arbitrary files and possibly execute arbitrary Perl modules with the privileges of the Web service.
* References: http://marc.theaimsgroup.com/?l=bugtraq&m=109509026406554&w=2 http://archives.neohapsis.com/archives/bugtraq/2004-09/0109.html http://www.osvdb.org/9954 http://secunia.com/advisories/12512
* Platforms Affected: LogicNow, PerlDesk version 1.8 and earlier versions Any operating system Any version |
Recommendation |
Upgrade to the latest version of PerlDesk (2 or later), available from the PerlDesk Web site at http://www.perldesk.com/ |
Related URL |
CVE-2004-1677,CVE-2004-1678 (CVE) |
Related URL |
11160 (SecurityFocus) |
Related URL |
17343,19712 (ISS) |
|