SystemTap 1.0 - 'stat-server' Arbitrary Command Injection
Author: Frank Ch. Eigler
type: remote
platform: linux
port: nan
date_added: 2010-01-15
date_updated: 2014-05-27
verified: 1
codes: CVE-2009-4273;OSVDB-61806
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/37842/info
SystemTap is prone to a remote command-injection vulnerability because it fails to adequately sanitize user-supplied input data.
Remote attackers can exploit this issue to execute arbitrary shell commands with the privileges of the user running the application.
Versions prior to SystemTap 1.1 are vulnerable.
The following example commands are available:
stap-client \; ...
stap-client -; ...
stap-client -D 'asdf ; ls /etc' ...
stap-client -e 'script' -D 'asdf ; \; '