Argument injection vulnerability in TellMe 1.2 and earlier allows remote attackers to modify command line arguments for the Whois program and obtain sensitive information via "--" style options in the q_Host parameter.
The product constructs a string for a command to be executed by a separate component in another control sphere, but it does not properly delimit the intended arguments, options, or switches within that command string.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/22522 | vdb entry third party advisory |
http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0107.html | mailing list patch vendor advisory exploit broken link |
http://kimihia.org.nz/projects/tellme/files/tellme-1.2-1.3.diff | product |
http://exploitlabs.com/files/advisories/EXPL-A-2005-015-tellme.txt | exploit patch vendor advisory |
http://secunia.com/advisories/17078 | broken link third party advisory patch vendor advisory |
http://www.osvdb.org/19871 | exploit vdb entry patch broken link |