HTTP: csGuestbook Multiple Plugins Arbitrary Code Execution
This signatures detects multiple issues in csGuestbook 1.0 and its related plugins. A successful attack can lead to arbitrary code execution. This is an old issue and newer versions of the application is unaffected by this threat.
Extended Description
csChat-R-Box is a web chat script. It will run on most Unix and Linux variants, as well as Microsoft Windows operating systems. csChat-R-Box is prone to an issue which may enable an attacker to execute Perl code with the privileges of the webserver process. For exploitation to be successful, the attacker must pass properly URL encoded Perl code in CGI parameters via a web request. For example: http://host/cgi-bin/csChatRBox.cgi?command=savesetup&setup=PERL_CODE_HERE
Affected Products
Cgiscript.net cschat-r-box
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Cgiscript.net
7.5
5.0