exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

S21SEC-016-en.txt

S21SEC-016-en.txt
Posted May 28, 2003
Authored by Ramon Pinuaga Cascales | Site s21sec.com

S 2 1 S E C Advisory 016 - Vignette Content Management and Application Portal software has a vulnerability that allows a remote attacker to inject a server side include that could lead to remote command execution. Affected versions include, but are not limited to, StoryServer 4 and 5 and Vignette V/5 and V/6.

tags | advisory, remote
SHA-256 | 6e683b01ef73501f7cca1af2773c0055d0e02e01749b77df85c5932c64cee74a

S21SEC-016-en.txt

Change Mirror Download
###############################################################
ID: S21SEC-016-en
Title: Vignette SSI Injection
Date: 15/03/2003
Status: Vendor contacted and solution available
Scope: SSI Execution, In some cases Remote command execution
Platforms: All
Author: rpinuaga
Location: http://www.s21sec.com/es/avisos/s21sec-016-en.txt
Release: External
###############################################################

S 2 1 S E C

http://www.s21sec.com

Vignette SSI Injection


About Vignette
--------------

Vignette develops Content Management and Application Portal Software.


Description of vulnerability
----------------------------

Vignette Software presents a vulnerability that permits the injection of Server Side Include Scripting under some circunstances.

If one Vignette Application take a text variable sent by an external web client, and show it after processing, it's possible to insert in this variable SSI commands.


If the SSI EXEC feature is enabled, the bug can lead to remote command execution, under the privileges of the Vignette Process:

It's important to note that the bug not only affect the default Vignette Applications, nor it affects all the applications developed over a Vignette Server Software.


Affected Versions and platforms
-------------------------------

This vulnerability has been tested in Vignette StoryServer 4, StoryServer 5, Vignette V/5 and Vignette V/6. But it seems that all currently avaliable versions are vulnerable.


Solution
--------

Vignette users should procceed to contact vignette throught the standard channels VOLS etc in order to get a solution.


Additional information
----------------------

These vulnerabilities have been found and researched by:

Ramon Pinuaga Cascales rpinuaga@s21sec.com

You can find the last version of this warning in:

http://www.s21sec.com/es/avisos/s21sec-016-en.txt

And other S21SEC warnings in http://www.s21sec.com/es/avisos/


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close