Ray Chan WWW Authorization Gateway 0.1 - Command Execution
Author: Albert Nubdy
type: remote
platform: multiple
port:
date_added: 1998-07-08
date_updated: 2017-11-15
verified: 1
codes: CVE-1999-1436;OSVDB-13526
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/152/info
A vulnerability exists in the WWW Authorization Gateway program written by Ray Chan. Version 1.0 fails to eliminate characters with special meaning to the shell prior to executing a command. As a result, an attacker can utilize certain characters to execute arbitrary commands on a system remotely, as whatever user invoked the cgi-bin.
Place the following as a username:
| some command
and any password. The command will be executed.