漏洞信息详情
Simple WAIS界面任意命令执行漏洞
- CNNVD编号:CNNVD-200212-368
- 危害等级: 超危
- CVE编号:
CVE-2002-2365
- 漏洞类型:
输入验证
- 发布时间:
2002-12-31
- 威胁类型:
远程
- 更新时间:
2002-12-31
- 厂 商:
springer_verlag_berlin_heidelberg - 漏洞来源:
Vulnerability disc… -
漏洞简介
Simple WAIS (SWAIS) 1.11存在漏洞。远程攻击者可以借助search字段的shell元字符执行任意命令,示例如使用“|”(管道)字符。
漏洞公告
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com
参考网址
来源: BID
名称: 5127
链接:http://www.securityfocus.com/bid/5127
来源: XF
名称: swais-command-execution(9453)
链接:http://www.iss.net/security_center/static/9453.php
来源: BUGTRAQ
名称: 20020630 Simple Wais 1.11 allows users to execute commands as SWAIS deamon.
链接:http://archives.neohapsis.com/archives/bugtraq/2002-06/0390.html
© 版权声明
文章版权归作者所有,未经允许请勿转载。
THE END