10
CVSSv2

CVE-2007-6176

Published: 30/11/2007 Updated: 29/09/2017
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

kb_whois.cgi in K+B-Bestellsystem (aka KB-Bestellsystem) allows remote malicious users to execute arbitrary commands via shell metacharacters in the (1) domain or (2) tld parameter in a check_owner action.

Vulnerable Product Search on Vulmon Subscribe to Product

amensa-soft k\\+b-bestellsystem 2.3.3

Exploits

"KB-Bestellsystem" is a domain order system written in Perl The "domain" and "tld" parameters in "kb_whoiscgi" are not filtering shell metacharacters The following examples will show you the /etc/passwd file: targethostcom/kb-bestellsystem/kb_whoiscgi?action=check_owner&domain=;cat%20/etc/passwd;&tld=com&tarrif= ta ...