Family: CGI abuses --> Category: attack
LedgerSMB / SQL-Ledger script Parameter Arbitrary Command Execution Vulnerability Vulnerability Scan
Vulnerability Scan Summary
Tries to run a command via LedgerSMB/SQL-Ledger login.pl
Detailed Explanation for this Vulnerability Test
The remote web server contains a Perl application that allows
arbitrary command execution.
The remote host is running LedgerSMB or SQL-Ledger, a web-based
double-entry accounting system.
The version of LedgerSMB or SQL-Ledger on the remote host fails to
sanitize user-supplied input to the 'script' parameter of the
'login.pl' script before using it to execute Perl code. An
unauthenticated attacker can leverage this issue to execute arbitrary
code on the remote host subject to the rights of the web server
See also :
Upgrade to LedgerSMB 1.1.5 / SQL-Ledger 2.6.21 or later as those
versions reportedly address the issue.
High / CVSS Base Score : 7.0
Click HERE for more information and discussions on this network vulnerability scan.