7.5
CVSSv2

CVE-1999-1053

Published: 13/09/1999 Updated: 05/09/2008
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 760
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

guestbook.pl cleanses user-inserted SSI commands by removing text between "<!--" and "-->" separators, which allows remote malicious users to execute arbitrary commands when guestbook.pl is run on Apache 1.3.9 and possibly other versions, since Apache allows other closing sequences besides "-->".

Vulnerable Product Search on Vulmon Subscribe to Product

apache http server 1.3.9

matt wright matt wright guestbook 2.3

Exploits

## # $Id: guestbook_ssi_execrb 9671 2010-07-03 06:21:31Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' c ...
## # $Id$ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class Metasploit3 &lt; Msf::Exploit::Remote include Msf ...

Github Repositories

CVE-1999-1053 Proof-of-Concept Exploit

CVE-1999-1053 Proof-of-Concept Exploit Background This Proof-of-Concept(PoC) exploit is inspired from a CTF web challenge called CVE 1999 in HKCERT CTF 2022 (Writeup link) Information Description: In Matt Wright Guestbook &lt;= 231, there is a Server-Side Include injection vulnerability that allows unauthenticated user to execute arbitrary code Original author: Patrick