HTTP: csGuestbook Multiple Plugins Arbitrary Code Execution

This signatures detects multiple issues in csGuestbook 1.0 and its related plugins. A successful attack can lead to arbitrary code execution. This is an old issue and newer versions of the application is unaffected by this threat.

Extended Description

csChat-R-Box is a web chat script. It will run on most Unix and Linux variants, as well as Microsoft Windows operating systems. csChat-R-Box is prone to an issue which may enable an attacker to execute Perl code with the privileges of the webserver process. For exploitation to be successful, the attacker must pass properly URL encoded Perl code in CGI parameters via a web request. For example: http://host/cgi-bin/csChatRBox.cgi?command=savesetup&setup=PERL_CODE_HERE

Affected Products

Cgiscript.net cschat-r-box

References

BugTraq: 4452

CVE: CVE-2002-1753

Short Name
HTTP:CGI:CSGUESTBOOK-PLUGIN-CE
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Arbitrary CVE-2002-0924 CVE-2002-1750 CVE-2002-1751 CVE-2002-1752 CVE-2002-1753 Code Execution Multiple Plugins bid:4452 csGuestbook
Release Date
03/20/2013
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Cgiscript.net

CVSS Score

7.5

5.0

Found a potential security threat?