HTTP File Server 'ParserLib.pas' Remote Command Execution Vulnerability
BID:69782
Info
HTTP File Server 'ParserLib.pas' Remote Command Execution Vulnerability
| Bugtraq ID: | 69782 |
| Class: | Input Validation Error |
| CVE: |
CVE-2014-6287 |
| Remote: | Yes |
| Local: | No |
| Published: | Sep 12 2014 12:00AM |
| Updated: | Oct 07 2014 12:01AM |
| Credit: | danielelinguaglossa |
| Vulnerable: |
HTTP File Server HTTP File Server 2.3(Beta Build #174) HTTP File Server HTTP File Server 2.3 beta |
| Not Vulnerable: | |
Discussion
HTTP File Server 'ParserLib.pas' Remote Command Execution Vulnerability
HTTP File Server is prone to a remote command-execution vulnerability because it fails to properly validate user-supplied input.
An attacker can execute arbitrary commands with the privileges of the affected application.
HTTP File Server 2.3.x is vulnerable; other versions may also be affected.
HTTP File Server is prone to a remote command-execution vulnerability because it fails to properly validate user-supplied input.
An attacker can execute arbitrary commands with the privileges of the affected application.
HTTP File Server 2.3.x is vulnerable; other versions may also be affected.
Exploit / POC
HTTP File Server 'ParserLib.pas' Remote Command Execution Vulnerability
The following example URI is available:
http://www.example.com/search=%00{.exec|cmd.}
The following example URI is available:
http://www.example.com/search=%00{.exec|cmd.}
Solution / Fix
HTTP File Server 'ParserLib.pas' Remote Command Execution Vulnerability
Solution:
Updates are available. Please see the references or vendor advisory for more information.
Solution:
Updates are available. Please see the references or vendor advisory for more information.
References
HTTP File Server 'ParserLib.pas' Remote Command Execution Vulnerability
References:
References: