PerlDesk Language Variable Server-Side 脚本执行漏洞

漏洞信息详情

PerlDesk Language Variable Server-Side 脚本执行漏洞

漏洞简介

PerlDesk的pdesk.cgi存在目录遍历漏洞。远程攻击者借助“..”序列lang参数以\\%00 (空值)字符终结的“..”序列读取部分任意文件和可能执行任意Perl模块,该漏洞在编译消息出错发生时泄露部分请求文件。

漏洞公告

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com .
@securityfocus.com>

参考网址

来源: XF
名称: perldesk-directory-traversal(19712)
链接:http://xforce.iss.net/xforce/xfdb/19712

来源: SECUNIA
名称: 12512
链接:http://secunia.com/advisories/12512

来源: BID
名称: 11160
链接:http://www.securityfocus.com/bid/11160

来源: BUGTRAQ
名称: 20040912 Posible Inclusion File in Perl Desk
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=109509026406554&w=2

受影响实体

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享