| VID |
21808 |
| Severity |
40 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The PerlDesk program is vulnerable to a file inclusion vulnerability in the pdesk.cgi script. PerlDesk is a Web-based help desk and email management program written in perl. PerlDesk version 1.8 and earlier versions could allow a remote attacker to traverse directories on the Web server, caused by improper validation of user-supplied input passed to the lang parameter of the pdesk.cgi script. By sending a specially-crafted URL containing "dot dot" sequences (../) and null byte (%00), a remote attacker could read arbitrary files and possibly execute arbitrary Perl modules with the privileges of the Web service.
* References: http://marc.theaimsgroup.com/?l=bugtraq&m=109509026406554&w=2 http://archives.neohapsis.com/archives/bugtraq/2004-09/0109.html http://www.osvdb.org/9954 http://secunia.com/advisories/12512
* Platforms Affected: LogicNow, PerlDesk version 1.8 and earlier versions Any operating system Any version |
| Recommendation |
Upgrade to the latest version of PerlDesk (2 or later), available from the PerlDesk Web site at http://www.perldesk.com/ |
| Related URL |
CVE-2004-1677,CVE-2004-1678 (CVE) |
| Related URL |
11160 (SecurityFocus) |
| Related URL |
17343,19712 (ISS) |
|