astrocam.cgi in AstroCam 0.9-1-1 through 1.4.0 allows remote attackers to execute arbitrary commands via shell metacharacters in an HTTP request. NOTE: earlier disclosures stated that the affected versions were 1.7.1 through 2.1.2, but the vendor explicitly stated that these were incorrect.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://astrocam.svn.sourceforge.net/viewvc/astrocam/BUGS?view=markup | |
http://securitytracker.com/id?1005523 | patch vdb entry |
http://www.iss.net/security_center/static/10538.php | patch vdb entry |
http://www.securityfocus.com/bid/6105 | patch vdb entry |