Short Name |
HTTP:CGI:CSGUESTBOOK-PLUGIN-CE |
---|---|
Severity |
Major |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
csGuestbook Multiple Plugins Arbitrary Code Execution |
Release Date |
2013/03/20 |
Update Number |
2247 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signatures detects multiple issues in csGuestbook 1.0 and its related plugins. A successful attack can lead to arbitrary code execution. This is an old issue and newer versions of the application is unaffected by this threat.
csChat-R-Box is a web chat script. It will run on most Unix and Linux variants, as well as Microsoft Windows operating systems. csChat-R-Box is prone to an issue which may enable an attacker to execute Perl code with the privileges of the webserver process. For exploitation to be successful, the attacker must pass properly URL encoded Perl code in CGI parameters via a web request. For example: http://host/cgi-bin/csChatRBox.cgi?command=savesetup&setup=PERL_CODE_HERE