5
CVSSv2

CVE-2009-4488

Published: 13/01/2010 Updated: 11/04/2024
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Varnish 2.0.6 writes data to a log file without sanitizing non-printable characters, which might allow remote malicious users to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator. NOTE: the vendor disputes the significance of this report, stating that "This is not a security problem in Varnish or any other piece of software which writes a logfile. The real problem is the mistaken belief that you can cat(1) a random logfile to your terminal safely.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

varnish.projects.linpro varnish 2.0.6

Exploits

source: wwwsecurityfocuscom/bid/37713/info Varnish is prone to a command-injection vulnerability because it fails to adequately sanitize user-supplied input in logfiles Attackers can exploit this issue to execute arbitrary commands in a terminal Varnish 206 is vulnerable; other versions may also be affected The following example ...
Nginx, Varnish, Cherokee, thttpd, mini-httpd, WEBrick, Orion, AOLserver, Yaws and Boa are subject to log escape sequence injection vulnerabilities ...

Github Repositories

Simple Python Version Exploits written by RiadhBenlamine, just for education

Python Exploits and Automation Exploits can be Found in exploit-db or another place , just i wrote python version for them Also , my own automation tools! varnish CVE-2009-4488 IIS microsoft