Vulnerability Description
kb_whois.cgi in K+B-Bestellsystem (aka KB-Bestellsystem) allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) domain or (2) tld parameter in a check_owner action.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Amensa-Soft | K\+B-Bestellsystem | 2.3.3 |
Related Weaknesses (CWE)
References
- http://marc.info/?l=bugtraq&m=119574911612874&w=2Exploit
- http://secunia.com/advisories/27782Vendor Advisory
- http://www.securityfocus.com/bid/26541Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/38635
- https://www.exploit-db.com/exploits/4647
- http://marc.info/?l=bugtraq&m=119574911612874&w=2Exploit
- http://secunia.com/advisories/27782Vendor Advisory
- http://www.securityfocus.com/bid/26541Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/38635
- https://www.exploit-db.com/exploits/4647
FAQ
What is CVE-2007-6176?
CVE-2007-6176 is a vulnerability with a CVSS score of 10.0 (HIGH). kb_whois.cgi in K+B-Bestellsystem (aka KB-Bestellsystem) allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) domain or (2) tld parameter in a check_owner action.
How severe is CVE-2007-6176?
CVE-2007-6176 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-6176?
Check the references section above for vendor advisories and patch information. Affected products include: Amensa-Soft K\+B-Bestellsystem.