Bajie HTTP JServer 0.78, and other versions before 0.80, allows remote attackers to execute arbitrary commands via shell metacharacters in an HTTP request for a CGI program that does not exist.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://www.geocities.com/gzhangx/websrv/docs/security.html | |
http://archives.neohapsis.com/archives/bugtraq/2001-02/0314.html | mailing list exploit patch vendor advisory |