CGI_lite.pm Insecure Input Handling Vulnerability

BID:2263

Info

CGI_lite.pm Insecure Input Handling Vulnerability

Bugtraq ID: 2263
Class: Design Error
CVE:
Remote: Yes
Local: No
Published: Aug 13 1997 12:00AM
Updated: Aug 13 1997 12:00AM
Credit: This vulnerability was announced by Andrew McNaughton <[email protected]> on August 13, 1997 via Bugtraq.
Vulnerable: Shishir Gundavaram CGI_lite.pm 1.62
Shishir Gundavaram CGI_lite.pm 1.8
Shishir Gundavaram CGI_lite.pm 1.7
Not Vulnerable:

Discussion

CGI_lite.pm Insecure Input Handling Vulnerability

It is possible for users to access sensitive files remotely due to a problem in the CGI_lite.pm module. The CGI_lite.pm module allows users to upload files to a remote system. However, due to inadequate checking of the input of filenames by the module, it is possible to either view the contents of a file, or arbitrarily execute a command on a host using the module. The $filename variable within the modules does not adequately escape the inputted data when creating a file. Therefore, when a command is entered through a form POST method, it is piped directly to a shell. Therefore, a user with malicious intentions could use this to either view the contents of files readable by the UID of the httpd process, or execute commands with the inherited UID and GID of the httpd process.
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report