Korean
<< Back
VID 22398
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The ListManager software, according to its banner, has an administrative command injection vulnerability via the pw parameter. Lyris ListManager is a web-based commercial mailing list management software utility written in Perl. Lyris ListManager version 8.9c and earlier versions could allow a remote attacker to execute arbitrary list administration commands via LFCR (%0A%0D) sequences in the pw parameter when subscribing a new user. By issuing a specially-crafted request embedding %0A%0D sequences in the pw parameter for the subscription page on the Web interface, a remote attacker could execute arbitrary list administration commands.

* Note: This check solely relied on the banner of the remote HTTP server to assess this vulnerability, so this might be a false positive.

* References:
http://metasploit.com/research/vulns/lyris_listmanager/
http://archives.neohapsis.com/archives/fulldisclosure/2005-12/0349.html
http://www.frsirt.com/english/advisories/2005/2820
http://osvdb.org/21547
http://secunia.com/advisories/17943/

* Platforms Affected:
Lyris Technologies, Inc., Lyris ListManager version 8.9c and earlier versions
Any operating system Any version
Recommendation Upgrade to the latest version of ListManager (8.95 or later), available from the Lyris Technologies, Inc. Web site at http://www.lyris.com/products/listmanager/
Related URL CVE-2005-4142 (CVE)
Related URL 15786 (SecurityFocus)
Related URL 23577 (ISS)