WBPublish (aka WBPublish.exe) in Fujitsu-Siemens WebTransactions 7.0, 7.1, and possibly other versions allows remote attackers to execute arbitrary commands via shell metacharacters in input that is sent through HTTP and improperly used during temporary session data cleanup, possibly related to (1) directory names, (2) template names, and (3) session IDs.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.sec-consult.com/files/20081219-0_fujitsu-siemens_webta_cmdexec.txt | |
http://bs2www.fujitsu-siemens.de/update/securitypatch.htm#english | patch |
https://exchange.xforce.ibmcloud.com/vulnerabilities/47495 | vdb entry |
http://www.securitytracker.com/id?1021475 | vdb entry |
http://securityreason.com/securityalert/4856 | third party advisory |
http://www.vupen.com/english/advisories/2008/3462 | vdb entry |
http://www.securityfocus.com/bid/32927 | vdb entry |
http://www.securityfocus.com/archive/1/499417/100/0/threaded | mailing list |
http://secunia.com/advisories/33168 | patch vendor advisory third party advisory |