search menu icon-carat-right cmu-wordmark

CERT Coordination Center

OPeNDAP code execution vulnerability

Vulnerability Note VU#857153

Original Release Date: 2007-04-30 | Last Revised: 2007-05-18


OPeNDAP server version 3 contains a vulnerability that allows an attacker to execute comands on the server.


From the OPenNDAP website:

OPeNDAP provides software which makes local data accessible to remote locations regardless of local storage format. OPeNDAP also provides tools for transforming existing applications into OPeNDAP clients (i.e., enabling them to remotely access OPeNDAP served data).

A CGI script in OPeNDAP Version 3 (CGI_server) contains a vulnerability that allows an attacker to execute arbitrary commands on the server by supplying a malicious URL.


A remote, unauthenticated attacker may be able to execute arbitrary commands.


Apply a patch
The OPeNDAP team has released a patch to address this issue. Users are encouraged to apply the patch as soon as possible.


Server version 4 (Hyrax) does not have this vulnerability.

Restrict access

Until updates can be applied, restricting access to vulnerable servers via password protectected directories or IP access control lists may mitigate this vulnerability.

Vendor Information


OPeNDAP, Inc. Affected

Updated:  April 30, 2007



Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.


See for more details.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CVSS Metrics

Group Score Vector



Thanks to the OPeNDAP team for information used in this report.

This document was written by Ryan Giobbi.

Other Information

CVE IDs: None
Severity Metric: 2.16
Date Public: 2007-05-14
Date First Published: 2007-04-30
Date Last Updated: 2007-05-18 19:43 UTC
Document Revision: 18

Sponsored by CISA.