csSearch.cgi in csSearch 2.3 and earlier allows remote attackers to execute arbitrary Perl code via the savesetup command and the setup parameter, which overwrites the setup.cgi configuration file that is loaded by csSearch.cgi.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/4368 | patch vdb entry exploit vendor advisory broken link third party advisory |
http://www.cgiscript.net/cgi-script/csNews/csNews.cgi?database=cgi.db&command=viewone&id=7 | product |
http://www.iss.net/security_center/static/8636.php | patch vendor advisory broken link vdb entry |
http://www.securityfocus.com/archive/1/264169 | mailing list vdb entry vendor advisory broken link third party advisory |