Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:CGI:GLIMPSE-PIPE

Severity

Medium

Recommended

No

Category

HTTP

Keywords

Glimpse Piped Command Execution

Release Date

2003/04/22

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: Glimpse Piped Command Execution


This signature detects attempts to exploit the vulnerable aglimpse CGI script used for searching a local Web server. The script accepts search queries and returns the results in a formatted HTML document. Attackers can use maliciously crafted URL requests to execute arbitrary commands on the Web server.

Extended Description

WebGlimpse and GlimpseHTTP are web indexing and search engine programs with some associated management scripts. GlimpseHTTP up to and including 2.0, and WebGlimpse prior to version 1.5, suffer from a common vulnerability involving the component "aglimpse". This script fails to filter the pipe metacharacter, allowing arbitrary command execution. The demonstration exploit for this vulnerability includes the unix shell "IFS" (Internal Field Separator) variable for situations where the web server filters space characters - by setting this to an acceptable character ("5" in the example exploit) it is possible to use commands with more than one field. (eg., "mail me@myhost.tld").

Affected Products

  • WebGlimpse.org GlimpseHTTP 1.0.0
  • WebGlimpse.org GlimpseHTTP 2.0.0
  • WebGlimpse.org WebGlimpse 1.0.0

References

  • BugTraq: 2026
  • CVE: CVE-1999-0147

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out