[] NeoSense

Network Security Wizards Dragon-Fire IDS 1.0 - Command Execution

Author: Stefan Lauda
type: remote
platform: hardware
port: 
date_added: 1999-08-05 
date_updated: 2017-11-15 
verified: 1 
codes: CVE-1999-0913;OSVDB-47 
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/564/info

The Dragon-Fire IDS remote web interface under version 1.0 has an insecure CGI script which allows for users to remotely execute commands as the user nobody. This could lead to a remote compromise of the system running Dragon-Fire.

Via the web interface for Dragon-Fire inside the IPONE field type your desired command prefaced with a | an example could be:

|echo 'uname -a'

The output of the command will then be displayed in the right hand window of the IDS WWW interface.