Vulnerability Note VU#857153

OPeNDAP code execution vulnerability

Original Release date: 30 Apr 2007 | Last revised: 18 May 2007


OPeNDAP server version 3 contains a vulnerability that allows an attacker to execute comands on the server.


From the OPenNDAP website:

    OPeNDAP provides software which makes local data accessible to remote locations regardless of local storage format. OPeNDAP also provides tools for transforming existing applications into OPeNDAP clients (i.e., enabling them to remotely access OPeNDAP served data).

A CGI script in OPeNDAP Version 3 (CGI_server) contains a vulnerability that allows an attacker to execute arbitrary commands on the server by supplying a malicious URL.


A remote, unauthenticated attacker may be able to execute arbitrary commands.


Apply a patch
The OPeNDAP team has released a patch to address this issue. Users are encouraged to apply the patch as soon as possible.


Server version 4 (Hyrax) does not have this vulnerability.

Restrict access

Until updates can be applied, restricting access to vulnerable servers via password protectected directories or IP access control lists may mitigate this vulnerability.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
OPeNDAP, Inc.Affected-30 Apr 2007
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



Thanks to the OPeNDAP team for information used in this report.

This document was written by Ryan Giobbi.

Other Information

  • CVE IDs: Unknown
  • Date Public: 14 May 2007
  • Date First Published: 30 Apr 2007
  • Date Last Updated: 18 May 2007
  • Severity Metric: 2.16
  • Document Revision: 18


If you have feedback, comments, or additional information about this vulnerability, please send us email.