search menu icon-carat-right cmu-wordmark

CERT Coordination Center


Input validation error in quikstore.cgi allows attackers to execute commands

Vulnerability Note VU#671444

Original Release Date: 2000-12-22 | Last Revised: 2002-03-05

Overview

The quikstore shopping cart script contains an input validation error that allows attackers to execute commands on affected web servers.

Description

The quikstore.cgi script is written in Perl and provides its users with shopping cart software for e-commerce transactions. In November 2000, the CERT/CC received a report of an input validation error in this script that allows attackers to execute commands that are available on the system. After reviewing portions of the Quikstore source code, we believe that this vulnerability was caused by the use of an insecure form of the Perl open call. By including certain shell metacharacters in the URL portion of an HTTP GET request, attackers can cause the Perl interpreter to execute any commands that are available to the web server process.

Depending on the configuration of the victim's web server, it may be possible to execute commands that are above the root of the web server directory.

Impact

Attackers can execute arbitrary commands with privileges equivalent to the web server or cgi user.

Solution

Quikstore has produced a patch for this vulnerability; please contact info@quikstore.com for further details.

The impact of this vulnerability can be reduced by restricting the set of commands available to the web server. On Unix and Linux systems, this can be accomplished using chroot. In addition, any scripts or binaries that are not necessary for web service should be removed from the user's web server directory.

Vendor Information

671444
Expand all

Quikstore

Notified:  December 01, 2000 Updated:  March 22, 2001

Status

  Vulnerable

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

According to Quikstore, versions after 2.11.00 are not affected by this vulnerability.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A

References

Credit

The CERT/CC thanks Anders Henke of Schlund+Partner AG for reporting this vulnerability and Quikstore for their assistance in researching the issue.

This document was written by Jeffrey P. Lanza.

Other Information

CVE IDs: None
Severity Metric: 15.39
Date Public: 2000-11-20
Date First Published: 2000-12-22
Date Last Updated: 2002-03-05 20:27 UTC
Document Revision: 26

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.