Korean
<< Back
VID 22390
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The ELOG server is vulnerable to multiple vulnerabilities which exist in versions prior to 2.6.1. ELOG (Electronic Web Lobgook) is a freely available logbook application with a Web interface. ELOG versions prior to 2.6.1 are vulnerable to a format string vulnerability in the elogd.c write_logfile() function. A remote attacker could exploit this vulnerability via the 'uname' parameter of the login form to execute arbitrary code on the affected host. In addition to this flaw, a remote attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to traverse directories and read arbitrary files outside of the web root directory with the privileges of the Web service.

* References:
http://midas.psi.ch/elogs/Forum/1608
http://secunia.com/advisories/18533/

* Platforms Affected:
ELOG versions prior to 2.6.1
Linux Any version
Unix Any version
Recommendation Upgrade to the latest version of ELOG (2.6.1 or later), available from the ELOG Download Web page at http://midas.psi.ch/elog/download.html
Related URL CVE-2006-0347,CVE-2006-0348 (CVE)
Related URL 16315 (SecurityFocus)
Related URL 24221,24224 (ISS)