CVE漏洞中文网

0DayBank一个专门收集整理全球互联网漏洞的公开发布网站
  1. 首页
  2. CVE
  3. 正文

OmniHTTPD File Corruption and Command Execution Vulnerability

2016年9月26日 1195点热度 0人点赞 0条评论

漏洞类别:Web server漏洞等级:

漏洞信息

OmniHTTPD is a compact Windows-based Web server by Omnicron Technologies.

OmniHTTPD has various features, such as multiple domain support, keep-alive connections, virtual IP and non-IP server support, and standard CGI support. Due to the implementation of 'statsconfig.pl', multiple vulnerabilities exist in OmniHTTPD. It's possible to corrupt various known filenames and execute arbitrary commands. By appending a known filename to the 'cgidir' form variable accompanied with a null argument, the known filename becomes corrupt.

Additionally, it's possible to execute commands on the target server. This is due to statsconfig.pl creating a perl script on the file. When the perl script is created, user-supplied data (the 'mostbrowsers' form variable if it is present) is written directly to the perl script file. If a malicious user sets this value to semi-colon separated perl commands, they will be executed when statsconfig runs the script. This may result in a malicious user gaining interactive access on the target host with the privilege level of the Web server/CGI process.

漏洞危害

Successful exploitation of this vulnerability could lead to a denial of service or a complete comprimise of the host.

解决方案

As a workaround, erase 'statsconfig.pl', along with any other unnecessary files in your 'cgi-bin'.

You an also download the latest version of OmniHTTPD from the Omnicron Technologies Web site.

0day

标签: 暂无
最后更新:2016年10月22日

小助手

这个人很懒,什么都没留下

点赞
< 上一篇
下一篇 >

文章评论

您需要 登录 之后才可以评论

COPYRIGHT © 2024 www.pdr.cn CVE漏洞中文网. ALL RIGHTS RESERVED.

鲁ICP备2022031030号

联系邮箱:wpbgssyubnmsxxxkkk@proton.me