masterCGI in the Unified Maintenance Tool in Alcatel OmniPCX Enterprise Communication Server R7.1 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the user parameter during a ping action.
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Link | Tags |
---|---|
http://www.vupen.com/english/advisories/2007/3185 | broken link vdb entry |
http://www.redteam-pentesting.de/advisories/rt-sa-2007-001.php | broken link |
http://www1.alcatel-lucent.com/psirt/statements/2007002/OXEUMT.htm | broken link |
http://secunia.com/advisories/26853 | vendor advisory broken link third party advisory |
http://marc.info/?l=full-disclosure&m=119002152126755&w=2 | mailing list exploit |
http://osvdb.org/40521 | broken link vdb entry |
http://www.securityfocus.com/archive/1/479699/100/0/threaded | mailing list vdb entry broken link third party advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/36632 | third party advisory vdb entry |
http://www.securityfocus.com/bid/25694 | vdb entry broken link third party advisory |