[] NeoSense

innoEDIT - 'innoedit.cgi' Remote Command Execution

Author: Felipe Andrian Peixoto
type: webapps
platform: cgi
port: 
date_added: 2014-03-21 
date_updated: 2015-12-29 
verified: 1 
codes: OSVDB-104904 
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/66367/info

innoEDIT is prone to a remote command-execution vulnerability because the application fails to sufficiently sanitize user-supplied input data.

An attacker may leverage this issue to execute arbitrary commands in the context of the affected application.

innoEDIT 6.2 is vulnerable; other versions may also be affected.

http://www.example.com/innoedit/innoedit.cgi?download=;id|