nlog CGI scripts do not properly filter shell metacharacters from the IP address argument, which could allow remote attackers to execute certain commands via (1) nlog-smb.pl or (2) rpc-nlog.pl.
Link | Tags |
---|---|
http://marc.info/?l=bugtraq&m=91471400632145&w=2 | mailing list |
http://marc.info/?l=bugtraq&m=91470326629357&w=2 | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/1550 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/1549 | vdb entry |