Guestex Shell Command Execution Vulnerability

Summary

Vulnerability
Guestex Shell Command Execution Vulnerability
Discovered
2006.02.11
Last Update
2006.02.21 Exploitation code published
ID
EV0076
CVE
CVE-2006-0777
Risk Level
high
Type
Command Execution
Status
Unpatched. No reply from developer(s)
Vendor
n/a
Vulnerable Software
Guestext (http://www.teca-scripts.com/)
Version
1.0
PoC/Exploit
Available
Solution
Not available
Discovered by
Aliaksandr Hartsuyeu (eVuln.com)

Description

Command Execution found in Guestext (http://www.teca-scripts.com/) script.

Vulnerable Script: guestex.pl

Variable $form{'email'} isn't properly sanitized. This can be used to execute arbitrary shell commands.

System access is possible.

PoC/Exploit

When adding new record:

email: some@email.com;[command]

Solution.

Solution for "Guestex Shell Command Execution Vulnerability" is not available. Check vendor's website for updates.