Vulnerabilities > CVE-2007-3011 - Remote Command Execution vulnerability in Fujitsu ServerView DBASCIIAccess
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
The DBAsciiAccess CGI Script in the web interface in Fujitsu-Siemens Computers ServerView before 4.50.09 allows remote attackers to execute arbitrary commands via shell metacharacters in the Servername subparameter of the ParameterList parameter.
Vulnerable Configurations
Exploit-Db
description | Fujitsu ServerView 4.50.8 DBASCIIAccess Remote Command Execution Vulnerability. CVE-2007-3011. Remote exploits for multiple platform |
id | EDB-ID:30264 |
last seen | 2016-02-03 |
modified | 2007-07-03 |
published | 2007-07-03 |
reporter | RedTeam Pentesting GmbH |
source | https://www.exploit-db.com/download/30264/ |
title | Fujitsu ServerView <= 4.50.8 DBASCIIAccess Remote Command Execution Vulnerability |
Nessus
NASL family | CGI abuses |
NASL id | SERVERVIEW_SERVERNAME_CMD_EXEC.NASL |
description | The remote host is running ServerView, a web-based suite of asset management tools. The version of ServerView installed on the remote host fails to sanitize user-supplied input to the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 25672 |
published | 2007-07-06 |
reporter | This script is Copyright (C) 2007-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/25672 |
title | ServerView Servername Parameter Arbitrary Command Execution |
code |
|
Packetstorm
data source | https://packetstormsecurity.com/files/download/57499/fujitsu-serverview-exec.txt |
id | PACKETSTORM:57499 |
last seen | 2016-12-05 |
published | 2007-07-07 |
reporter | redteam-pentesting.de |
source | https://packetstormsecurity.com/files/57499/fujitsu-serverview-exec.txt.html |
title | fujitsu-serverview-exec.txt |
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 24762 CVE(CAN) ID: CVE-2007-3011 ServerView是用于进行自动分析和版本维护的资产管理工具。 ServerView的Web接口处理用户数据时存在输入验证漏洞,远程攻击者可能利用此漏洞在服务器上以Web进程的权限执行任意命令。 DBAsciiAccess CGI脚本提供了ping功能,该脚本Parameterlist参数的Servername子参数给出了所要ping的IP地址,但没有对这个IP地址执行任何检查。如果在IP后添加了拖尾分号,攻击者就可以注入任意shell命令并以Web服务器进程的权限执行。 Fujitsu ServerView < 4.50.09 临时解决方法: * 禁止不可信任用户访问ServerView的Web接口。 厂商补丁: Fujitsu ------- 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: <a href="http://support.fujitsu-siemens.com/Download/ShowDescription.asp?SoftwareGUID=D1ED76B7-FB37-4375-8744-8E6D5CFDC87F" target="_blank">http://support.fujitsu-siemens.com/Download/ShowDescription.asp?SoftwareGUID=D1ED76B7-FB37-4375-8744-8E6D5CFDC87F</a> |
id | SSV:1970 |
last seen | 2017-11-19 |
modified | 2007-07-05 |
published | 2007-07-05 |
reporter | Root |
source | https://www.seebug.org/vuldb/ssvid-1970 |
title | Fujitsu ServerView DBASCIIAccess脚本远程代码执行漏洞 |
References
- http://osvdb.org/37835
- http://secunia.com/advisories/25944
- http://securityreason.com/securityalert/2858
- http://www.redteam-pentesting.de/advisories/rt-sa-2007-002.php
- http://www.securityfocus.com/archive/1/472800/100/0/threaded
- http://www.securityfocus.com/bid/24762
- http://www.vupen.com/english/advisories/2007/2441
- https://exchange.xforce.ibmcloud.com/vulnerabilities/35257