COMMAND
NC Book
SYSTEMS AFFECTED
NetCode NC Book 0.2b
PROBLEM
'digitalseed' posted following. A pretty big hole in the main
script of that guestbook leads to command execution on the remote
server running this vulnerable perl script. Exploit:
http://target/cgi-bin/ncbook/book.cgi?action=default¤t=|ls -la/|&form_tid=996604045&prev=main.html&list_message_index=10
The above line if given will output the file contents of the
kernel dir. Also you can execute any commands (ls, cat, rm etc).
Original discovery: digitalseed and ksenor.
SOLUTION
Nothing yet.