CVE-1999-1154

Current Description

LakeWeb Filemail CGI script allows remote attackers to execute arbitrary commands via shell metacharacters in the recipient email address.

Basic Data

PublishedNovember 09, 1998
Last ModifiedDecember 19, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score7.5
SeverityHIGH
Exploitability Score10.0
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationLakewebFilemail Cgi Script********

Vulnerable Software List

VendorProductVersions
Lakeweb Filemail Cgi Script *

References

NameSourceURLTags
http://lakeweb.com/scripts/http://lakeweb.com/scripts/MISCVendor Advisory
19981109 Several new CGI vulnerabilitieshttp://www.securityfocus.com/archive/1/11175BUGTRAQExploit Patch Vendor Advisory
cgi-perl-mail-programs(1400)https://exchange.xforce.ibmcloud.com/vulnerabilities/1400XF