Vulnerabilities > CVE-2005-1950 - Remote Command Execution vulnerability in Darryl Burgdorf Webhints 1.3
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
hints.pl in Webhints 1.03 allows remote attackers to execute arbitrary commands via shell metacharacters in the argument.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | Webhints <= 1.03 Remote Command Execution Exploit (perl code) (1). CVE-2005-1950. Webapps exploit for cgi platform |
id | EDB-ID:1039 |
last seen | 2016-01-31 |
modified | 2005-06-11 |
published | 2005-06-11 |
reporter | Alpha_Programmer |
source | https://www.exploit-db.com/download/1039/ |
title | Webhints <= 1.03 - Remote Command Execution Exploit perl code 1 |
Nessus
NASL family | CGI abuses |
NASL id | WEBHINTS_REMOTE_CMD_EXEC.NASL |
description | The remote host is running the WebHints scripts. This version of WebHints has a remote command execution vulnerability in hints.pl. A remote attacker could exploit this to execute arbitrary commands on the system. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 18478 |
published | 2005-06-13 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/18478 |
title | WebHints hints.pl Arbitrary Command Execution |
code |
|