Guestex Shell Command Execution Vulnerability
Summary
- Vulnerability
- Guestex Shell Command Execution Vulnerability
- Discovered
- 2006.02.11
- Last Update
- 2006.02.21 Exploitation code published
- ID
- EV0076
- CVE
- CVE-2006-0777
- Risk Level
- high
- Type
- Command Execution
- Status
- Unpatched. No reply from developer(s)
- Vendor
- n/a
- Vulnerable Software
- Guestext (http://www.teca-scripts.com/)
- Version
- 1.0
- PoC/Exploit
- Available
- Solution
- Not available
- Discovered by
- Aliaksandr Hartsuyeu (eVuln.com)
Description
Command Execution found in Guestext (http://www.teca-scripts.com/) script.
Vulnerable Script: guestex.pl
Variable $form{'email'} isn't properly sanitized. This can be used to execute arbitrary shell commands.
System access is possible.
PoC/Exploit
When adding new record:
email: some@email.com;[command]
Solution.
Solution for "Guestex Shell Command Execution Vulnerability" is not available. Check vendor's website for updates.