masterCGI in the Unified Maintenance Tool in Alcatel OmniPCX Enterprise Communication Server R7.1 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the user parameter during a ping action.
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Link | Tags |
---|---|
http://www.vupen.com/english/advisories/2007/3185 | vdb entry broken link |
http://www.redteam-pentesting.de/advisories/rt-sa-2007-001.php | broken link |
http://www1.alcatel-lucent.com/psirt/statements/2007002/OXEUMT.htm | broken link |
http://secunia.com/advisories/26853 | broken link third party advisory vendor advisory |
http://marc.info/?l=full-disclosure&m=119002152126755&w=2 | mailing list exploit |
http://osvdb.org/40521 | vdb entry broken link |
http://www.securityfocus.com/archive/1/479699/100/0/threaded | mailing list vdb entry third party advisory broken link |
https://exchange.xforce.ibmcloud.com/vulnerabilities/36632 | vdb entry third party advisory |
http://www.securityfocus.com/bid/25694 | vdb entry third party advisory broken link |