search menu icon-carat-right cmu-wordmark

CERT Coordination Center

WebGlimpse command injection vulnerability

Vulnerability Note VU#364363

Original Release Date: 2012-03-20 | Last Revised: 2012-03-27

Overview

Webglimpse, a web site search application, contains a command injection vulnerability.

Description

The webglimpse.cgi script contains a command injection vulnerability. An attacker can use a specifically crafted query URL parameter to run system commands. The results of the command will be displayed in the resulting web page.

An example of the query parameter is below:
query=%27%26command+and+arguments+go+here%26%27

It has been reported that this vulnerability is being exploited in the wild.

Impact

An attacker may be able to run operating system commands under the context of the user running the web server. It has been reported that attackers are leveraging this vulnerability to install PHP backdoors on affected web servers.

Solution

Apply an Update

Webglimpse version 2.20.0 has been released to address this vulnerability.

Vendor Information

364363
 
Affected   Unknown   Unaffected

WebGlimpse

Notified:  February 14, 2012 Updated:  March 20, 2012

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.


CVSS Metrics

Group Score Vector
Base 5.0 AV:N/AC:--/Au:N/C:C/I:C/A:P
Temporal 4.3 E:H/RL:OF/RC:C
Environmental 4.3 CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND

References

Acknowledgements

Thanks to Kevin Perry for reporting this vulnerability.

This document was written by Jared Allar.

Other Information

CVE IDs: None
Severity Metric: 3.38
Date Public: 2012-03-20
Date First Published: 2012-03-20
Date Last Updated: 2012-03-27 20:22 UTC
Document Revision: 25

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.