Multiple Vendor BSD Global Port Package CGI Vulnerability

BID:1854

Info

Multiple Vendor BSD Global Port Package CGI Vulnerability

Bugtraq ID: 1854
Class: Access Validation Error
CVE:
Remote: Yes
Local: No
Published: Oct 26 2000 12:00AM
Updated: Oct 26 2000 12:00AM
Credit: This vulnerability was first discovered by Shiago Yamaguchi, and publicly announced by NetBSD Security on October 26, 2000.
Vulnerable: Shigio Yamaguchi Global 3.55
+ FreeBSD FreeBSD 4.1.1
+ FreeBSD FreeBSD 4.1
+ FreeBSD FreeBSD 4.0
+ FreeBSD FreeBSD 3.5 x
+ NetBSD NetBSD 1.4.2
+ NetBSD NetBSD 1.4.1
+ NetBSD NetBSD 1.4
Not Vulnerable: FreeBSD FreeBSD 4.2
FreeBSD FreeBSD 3.5

Discussion

Multiple Vendor BSD Global Port Package CGI Vulnerability

Global is a source code tag system included in the NetBSD ports package. A vulnerability exists in versions 3.55 and prior that allows for an attacker to remotely execute commands.

The problem occurs in the handling of quoted and escaped characters by the Common Gateway Interface script. An administrator can use the "htags -f" function to generate a CGI script that will provide the interface between the web server and the system. However, through the CGI, it is possible for a malicious user to pass a specially formatted string to the interface, resulting in the execution of a shell command.

Exploit / POC

Multiple Vendor BSD Global Port Package CGI Vulnerability

Currently the SecurityFocus staff are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].

Solution / Fix

Multiple Vendor BSD Global Port Package CGI Vulnerability

Solution:
It is recommended that all users of this package upgrade to a minimum version of 4.0.1. In the event that this is not possible, a modification of the file HTML/cgi-bin/global.cgi to the following format is recommended:

Around line 35:

From: $pattern =~ s/'//g;

To: $pattern =~ s/"//g;


Shigio Yamaguchi Global 3.55

References

Multiple Vendor BSD Global Port Package CGI Vulnerability

References:
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report