Vulnerabilities > CVE-2005-0439 - Remote vulnerability in ELOG Web Logbook
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Buffer overflow in the decode_post function in ELOG before 2.5.7 allows remote attackers to execute arbitrary code via attachments with long file names.
Vulnerable Configurations
Exploit-Db
description | ELOG <= 2.5.6 Remote Shell Exploit. CVE-2005-0439. Remote exploits for multiple platform |
id | EDB-ID:805 |
last seen | 2016-01-31 |
modified | 2005-02-09 |
published | 2005-02-09 |
reporter | n4rk0tix |
source | https://www.exploit-db.com/download/805/ |
title | ELOG <= 2.5.6 - Remote Shell Exploit |
Nessus
NASL family | CGI abuses |
NASL id | ELOG_LOGBOOK_MULTIPLE.NASL |
description | The remote host is running ELOG Web Logbook, a free webinterface logbook. According to its banner, the version of ELOG Web Logbook installed on the remote host contains a buffer overflow that can be triggered when handing attachment with names longer than 256 characters to execute code on the remote host subject to the permissions under which ELOG operates. In addition, it is possible to retrieve a copy of the application |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 16469 |
published | 2005-02-16 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/16469 |
title | ELOG Web Logbook < 2.5.7 Multiple Remote Vulnerabilities (OF, Traversal) |