Perlbot Text变量远程命令执行漏洞

漏洞信息详情

Perlbot Text变量远程命令执行漏洞

漏洞简介

Perlbot 1.9.2版本存在漏洞。远程攻击者借助(1)SpelCheck.pm的$text变量或者(2) HTMLPlog.pm的$filename变量的shell元字符执行任意命令。

漏洞公告

The vendor will reportedly fix this vulnerability in a newer release of Perlbot.
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com .
@securityfocus.com>

参考网址

来源: BID
名称: 6009
链接:http://www.securityfocus.com/bid/6009

来源: BID
名称: 6008
链接:http://www.securityfocus.com/bid/6008

来源: XF
名称: perlbot-filename-command-execution(10404)
链接:http://www.iss.net/security_center/static/10404.php

来源: XF
名称: perlbot-text-command-execution(10403)
链接:http://www.iss.net/security_center/static/10403.php

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享