| VID |
22390 |
| Severity |
40 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The ELOG server is vulnerable to multiple vulnerabilities which exist in versions prior to 2.6.1. ELOG (Electronic Web Lobgook) is a freely available logbook application with a Web interface. ELOG versions prior to 2.6.1 are vulnerable to a format string vulnerability in the elogd.c write_logfile() function. A remote attacker could exploit this vulnerability via the 'uname' parameter of the login form to execute arbitrary code on the affected host. In addition to this flaw, a remote attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to traverse directories and read arbitrary files outside of the web root directory with the privileges of the Web service.
* References: http://midas.psi.ch/elogs/Forum/1608 http://secunia.com/advisories/18533/
* Platforms Affected: ELOG versions prior to 2.6.1 Linux Any version Unix Any version |
| Recommendation |
Upgrade to the latest version of ELOG (2.6.1 or later), available from the ELOG Download Web page at http://midas.psi.ch/elog/download.html |
| Related URL |
CVE-2006-0347,CVE-2006-0348 (CVE) |
| Related URL |
16315 (SecurityFocus) |
| Related URL |
24221,24224 (ISS) |
|