Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2003-1365

Overview

Vulnerability Score 5.0 5.0
CVE Id CVE-2003-1365
Last Modified 05 Sep 2008 04:36:44
Published 31 Dec 2003 12:00:00
Confidentiality Impact NONE NONE
Integrity Impact PARTIAL PARTIAL
Availability Impact NONE NONE
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2003-1365

Summary

The escape_dangerous_chars function in CGI::Lite 2.0 and earlier does not correctly remove special characters including (1) "\" (backslash), (2) "?", (3) "~" (tilde), (4) "^" (carat), (5) newline, or (6) carriage return, which could allow remote attackers to read or write arbitrary files, or execute arbitrary commands, in shell scripts that rely on CGI::Lite to filter such dangerous inputs.

Vulnerable Systems

Application

  • Perl Cgi Lite 2.0


References

XF - cgilite-shell-command-execution(11308)

BID - 6833

BUGTRAQ - 20030211 Security bug in CGI::Lite::escape_dangerous_chars() function

MISC - http://use.perl.org/~cbrooks/journal/10542

CONFIRM - http://search.cpan.org/~smylers/CGI-Lite-2.02/Lite.pm

SREASON - 3237


Last Updated: 27 May 2016 10:38:20