{"vuid":"VU#672419","idnumber":"672419","name":"Unix Manual PHP-Script does not adequately validate user input thereby allowing arbitrary command execution","keywords":["Unix Manual PHP-Script","user input","pipe command","arbitrary command execution","manual.php"],"overview":"User Manual does not adequately validate user input, allowing attackers to execute arbitrary commands on the server.","clean_desc":"Unix Manual (as known as manual.php) is a PHP script used to lookup and display man pages on the web. User Manual does not adequately filter user input before passing it to the shell, allowing attackers to submit and execute arbitrary commands on the server.","impact":"Remote attackers can execute arbitrary commands on the server with privileges of the web server process.","resolution":"The CERT/CC is currently unaware of a practical solution to this problem.","workarounds":"","sysaffected":"","thanks":"Thanks to Florian Hobelsberger of BlueScreen for reporting this vulnerability.","author":"This document was written by Shawn Van Ittersum.","public":["h","t","t","p",":","/","/","w","w","w",".","s","e","c","u","r","i","t","y","f","o","c","u","s",".","c","o","m","/","b","i","d","/","3","7","1","8"],"cveids":["CVE-2001-1214"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2001-12-17T15:59:56Z","publicdate":"2001-12-15T00:00:00Z","datefirstpublished":"2002-09-26T22:02:06Z","dateupdated":"2002-09-26T22:02:10Z","revision":4,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"4","cam_population":"4","cam_impact":"10","cam_easeofexploitation":"15","cam_attackeraccessrequired":"20","cam_scorecurrent":"4.275","cam_scorecurrentwidelyknown":"5.4","cam_scorecurrentwidelyknownexploited":"9.9","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":4.275,"vulnote":null}