CVSTrac versions 1.x have an input validation flaw that allows for arbitrary command execution.
a4fbbe43075d15f6f1f2aa3f8a3d21cf99c42b351348d35ac984950bd03c8bc6
Hi, Im Richard Ngo, this is the first time i report an
exploit and found a remote exploit that could allow
arbitrary code execution in CVStrac.
sample exploit
filediff?f=CVSROOT/rcsinfo&v1=1.1&v2=1.2;w;
All versions vulnerable. I have not contacted
cvstrac.org since i cant find their email address.
Please give me credit for the exploit and *please dont
release the exploit code to the public* for other
websites security. Maybe just create an advisory.
Thank you.
__________________________________________________
Do You Yahoo!?
Tired of spam? Yahoo! Mail has the best spam protection around
https://mail.yahoo.com