Vulnerabilities > CVE-2005-0439 - Remote vulnerability in ELOG Web Logbook

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
stefan-ritt
nessus
exploit available

Summary

Buffer overflow in the decode_post function in ELOG before 2.5.7 allows remote attackers to execute arbitrary code via attachments with long file names.

Exploit-Db

descriptionELOG <= 2.5.6 Remote Shell Exploit. CVE-2005-0439. Remote exploits for multiple platform
idEDB-ID:805
last seen2016-01-31
modified2005-02-09
published2005-02-09
reportern4rk0tix
sourcehttps://www.exploit-db.com/download/805/
titleELOG <= 2.5.6 - Remote Shell Exploit

Nessus

NASL familyCGI abuses
NASL idELOG_LOGBOOK_MULTIPLE.NASL
descriptionThe remote host is running ELOG Web Logbook, a free webinterface logbook. According to its banner, the version of ELOG Web Logbook installed on the remote host contains a buffer overflow that can be triggered when handing attachment with names longer than 256 characters to execute code on the remote host subject to the permissions under which ELOG operates. In addition, it is possible to retrieve a copy of the application
last seen2020-06-01
modified2020-06-02
plugin id16469
published2005-02-16
reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/16469
titleELOG Web Logbook < 2.5.7 Multiple Remote Vulnerabilities (OF, Traversal)