CVE-ID

CVE-2001-0562

• Severity Rating • Fix Information • Vulnerable Software Versions • SCAP Mappings
Description
a1disp.cgi program in Drummond Miles A1Stats prior to 1.6 allows a remote attacker to execute commands via a specially crafted URL which includes shell metacharacters.
References
Note: References are provided for the convenience of the reader to help distinguish between vulnerabilities. The list is not intended to be complete.
Date Entry Created
20010727 Disclaimer: The entry creation date may reflect when the CVE-ID was allocated or reserved, and does not necessarily indicate when this vulnerability was discovered, shared with the affected vendor, publicly disclosed, or updated in CVE.
Phase (Legacy)
Proposed (20010727)
Votes (Legacy)
ACCEPT(3) Cole, Frech, Ziese
NOOP(4) Bishop, Christey, Foat, Wall
Comments (Legacy)
 Frech> CONFIRM:http://www.gadnet.com/cgi-bin/ultimatebb.cgi?ubb=get_topic&f=1
   5&t=000008
   Statement of fix is ambiguous: A major security flaw in the scripts
   has now been fixed. For obvious reasons the details of the flaw will
   not be posted here. 
   Site lists their product as A1-Stats, not A1Stats as in description.
 CHANGE> [Bishop changed vote from REVIEWING to NOOP]
 Christey> The URL recommended by Andre is *probably* addressing this
   problem, but it's not quite certain.  There is insufficient
   detail to determine if the vendor has truly acknowledged the
   problem.  I have an email to a1stats@gadnet.com to see
   if I can confirm.
   
   This is affected by CD:SF-EXEC since multiple executables in the same
   package are affected (a1disp.cgi, a1disp2.cgi, a1disp4.cgi, and
   a1disp3.cgi).
 Christey> Received confirmation via email, 2/26/2002.

Proposed (Legacy)
20010727
This is an entry on the CVE list, which standardizes names for security problems.