ID CVE-2004-2347
Summary blog.cgi in Leif M. Wright Web Blog 1.1 and 1.1.5 allows remote attackers to execute arbitrary commands via shell metacharacters such as '|' in the file parameter of ViewFile requests.
References
Vulnerable Configurations
  • cpe:2.3:a:leif_m._wright:web_blog:1.1:*:*:*:*:*:*:*
    cpe:2.3:a:leif_m._wright:web_blog:1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:leif_m._wright:web_blog:1.1.5:*:*:*:*:*:*:*
    cpe:2.3:a:leif_m._wright:web_blog:1.1.5:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 11-07-2017 - 01:31)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 9539
bugtraq 20040129 Web Blog 1.1 Remote Execute Commands Bug
confirm http://leifwright.com/scripts/Blog.html
osvdb 3793
secunia 10776
xf webblog-file-command-execution(15019)
Last major update 11-07-2017 - 01:31
Published 31-12-2004 - 05:00
Last modified 11-07-2017 - 01:31
Back to Top