Vulnerabilities > CVE-2004-2347 - Remote Command Execution vulnerability in Leif M. Wright web Blog 1.1/1.1.5
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
blog.cgi in Leif M. Wright Web Blog 1.1 and 1.1.5 allows remote attackers to execute arbitrary commands via shell metacharacters such as '|' in the file parameter of ViewFile requests.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
Exploit-Db
description | Leif M. Wright Web Blog 1.1 Remote Command Execution Vulnerability. CVE-2004-2347. Webapps exploit for cgi platform |
id | EDB-ID:23629 |
last seen | 2016-02-02 |
modified | 2004-01-31 |
published | 2004-01-31 |
reporter | ActualMInd |
source | https://www.exploit-db.com/download/23629/ |
title | Leif M. Wright Web Blog 1.1 - Remote Command Execution Vulnerability |
Nessus
NASL family | CGI abuses |
NASL id | LEIFWRIGHT_BLOG_CMD_EXECUTION.NASL |
description | The remote host is running LeifWright |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 12033 |
published | 2004-02-02 |
reporter | This script is Copyright (C) 2004-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/12033 |
title | Leif Wright Web Blog blog.cgi ViewFile Request file Parameter Arbitrary Command Execution |
code |
|