[] NeoSense

OnlineArts DailyDose 1.1 - 'dose.pl' Remote Command Execution

Author: Don_Huan
type: webapps
platform: cgi
port: 
date_added: 2003-11-10 
date_updated: 2017-04-01 
verified: 1 
codes: OSVDB-2799 
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/9000/info

It has been reported that DailyDose may be prone to a remote command execution vulnerability due to insufficient sanitization of $temp variable in dose.pl script. An attacker may submit arbitrary commands that will be executed in the context of the web server hosting the vulnerable script.

DailyDose v 1.1 has been reported to be prone to this issue however other versions may be affected as well.

http://www.example.com/cgi-bin/dose.pl?daily&somefile.txt&|ls|