ID CVE-2009-4487
Summary nginx 0.7.64 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.
References
Vulnerable Configurations
  • cpe:2.3:a:f5:nginx:0.7.64:*:*:*:*:*:*:*
    cpe:2.3:a:f5:nginx:0.7.64:*:*:*:*:*:*:*
CVSS
Base: 6.8 (as of 10-11-2021 - 15:51)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:M/Au:N/C:P/I:P/A:P
refmap via4
bid 37711
bugtraq 20100110 Nginx, Varnish, Cherokee, thttpd, mini-httpd, WEBrick, Orion, AOLserver, Yaws and Boa log escape sequence injection
misc http://www.ush.it/team/ush/hack_httpd_escape/adv.txt
Last major update 10-11-2021 - 15:51
Published 13-01-2010 - 20:30
Last modified 10-11-2021 - 15:51
Back to Top