| VID |
22398 |
| Severity |
40 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The ListManager software, according to its banner, has an administrative command injection vulnerability via the pw parameter. Lyris ListManager is a web-based commercial mailing list management software utility written in Perl. Lyris ListManager version 8.9c and earlier versions could allow a remote attacker to execute arbitrary list administration commands via LFCR (%0A%0D) sequences in the pw parameter when subscribing a new user. By issuing a specially-crafted request embedding %0A%0D sequences in the pw parameter for the subscription page on the Web interface, a remote attacker could execute arbitrary list administration commands.
* Note: This check solely relied on the banner of the remote HTTP server to assess this vulnerability, so this might be a false positive.
* References: http://metasploit.com/research/vulns/lyris_listmanager/ http://archives.neohapsis.com/archives/fulldisclosure/2005-12/0349.html http://www.frsirt.com/english/advisories/2005/2820 http://osvdb.org/21547 http://secunia.com/advisories/17943/
* Platforms Affected: Lyris Technologies, Inc., Lyris ListManager version 8.9c and earlier versions Any operating system Any version |
| Recommendation |
Upgrade to the latest version of ListManager (8.95 or later), available from the Lyris Technologies, Inc. Web site at http://www.lyris.com/products/listmanager/ |
| Related URL |
CVE-2005-4142 (CVE) |
| Related URL |
15786 (SecurityFocus) |
| Related URL |
23577 (ISS) |
|