Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:CGI:CSGUESTBOOK-PLUGIN-CE

Severity

High

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

csGuestbook Multiple Plugins Arbitrary Code Execution

Release Date

2013/03/20

Update Number

2247

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: csGuestbook Multiple Plugins Arbitrary Code Execution


This signatures detects multiple issues in csGuestbook 1.0 and its related plugins. A successful attack can lead to arbitrary code execution. This is an old issue and newer versions of the application is unaffected by this threat.

Extended Description

csChat-R-Box is a web chat script. It will run on most Unix and Linux variants, as well as Microsoft Windows operating systems. csChat-R-Box is prone to an issue which may enable an attacker to execute Perl code with the privileges of the webserver process. For exploitation to be successful, the attacker must pass properly URL encoded Perl code in CGI parameters via a web request. For example: http://host/cgi-bin/csChatRBox.cgi?command=savesetup&setup=PERL_CODE_HERE

Affected Products

  • CGISCRIPT.NET csChat-R-Box 1.0.0

References

  • BugTraq: 4452
  • CVE: CVE-2002-0924
  • CVE: CVE-2002-1750
  • CVE: CVE-2002-1751
  • CVE: CVE-2002-1752
  • CVE: CVE-2002-1753

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out