Vulnerabilities > CVE-2006-1831 - Unspecified vulnerability in Coder-World Sysinfo 1.21
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Direct static code injection vulnerability in sysinfo.cgi in sysinfo 1.21 and possibly other versions before 2.25 allows remote attackers to execute arbitrary commands via a leading ; (semicolon) in the name parameter in a systemdoc action, which is injected into phpinfo.php.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | SysInfo 1.21 (sysinfo.cgi) Remote Command Execution Exploit. CVE-2006-1831,CVE-2006-1832. Webapps exploit for cgi platform |
file | exploits/cgi/webapps/1677.php |
id | EDB-ID:1677 |
last seen | 2016-01-31 |
modified | 2006-04-14 |
platform | cgi |
port | |
published | 2006-04-14 |
reporter | rgod |
source | https://www.exploit-db.com/download/1677/ |
title | SysInfo 1.21 sysinfo.cgi Remote Command Execution Exploit |
type | webapps |
Nessus
NASL family | CGI abuses |
NASL id | SYSINFO_NAME_CMD_EXEC.NASL |
description | The remote host is running Sysinfo, a web-based system monitor. The version of Sysinfo installed on the remote host fails to sanitize user-supplied input to the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 21237 |
published | 2006-04-17 |
reporter | This script is Copyright (C) 2006-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/21237 |
title | Sysinfo name Parameter Arbitrary Code Execution |
code |
|
References
- http://secunia.com/advisories/19690
- http://secunia.com/advisories/19690
- http://www.securityfocus.com/bid/17523
- http://www.securityfocus.com/bid/17523
- http://www.vupen.com/english/advisories/2006/1360
- http://www.vupen.com/english/advisories/2006/1360
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25906
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25906
- https://www.exploit-db.com/exploits/1677
- https://www.exploit-db.com/exploits/1677