CGI implementation in Yaws web server versions 1.81 to 2.0.7 is vulnerable to OS command injection.
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
https://github.com/erlyaws/yaws/commits/master | third party advisory patch |
https://packetstormsecurity.com/files/159106/Yaws-2.0.7-XML-Injection-Command-Injection.html | exploit vdb entry third party advisory |
https://vuln.be/post/yaws-xxe-and-shell-injections/ | third party advisory exploit |
https://github.com/vulnbe/poc-yaws-cgi-shell-injection | third party advisory exploit |
https://lists.debian.org/debian-lts-announce/2020/09/msg00022.html | third party advisory mailing list |
https://usn.ubuntu.com/4569-1/ | third party advisory vendor advisory |
https://www.debian.org/security/2020/dsa-4773 | third party advisory vendor advisory |