BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to the Zeroday Tracker: Your Vulnerability Watchlist

Get critical updates on the latest zeroday threats, including impact, mitigation and protection information - only from BeyondTrust.

FitNesse Arbitrary Command Execution Vulnerability

Disclosed February 25, 2014    Zeroday : 148 days

Vulnerability Description:

FitNesse is vulnerable to an arbitrary command execution vulnerability, whereby an attacker can pass malicious input to the “pageContent” POST parameter. This parameter is not properly sanitized before being used to execute commands, thereby allowing an attacker to arbitrarily execute commands within the context of the web server.

Vendors:

FitNesse

Vulnerable Software/Devices:

FitNesse v20131110 and possibly other versions

Vulnerability Severity:

High

Exploit Availability:

Publicly Available

Exploit Impact:

Remote Code Execution
Exploitation of this vulnerability (arbitrary command execution) is possible through the use of methods like drive-by attacks. Remote attackers who successfully exploit this vulnerability will be able to execute commands on the vulnerable system with the same rights as the web server.

BeyondTrust Prevention and Detection:

BeyondTrust's Retina® Network Security Scanner scans devices to detect for this vulnerability.

  • 33032 - FitNesse Arbitrary Command Execution Vulnerability (20131123) (Zero-Day)

Mitigation:

No mitigation currently available. Avoid using FitNesse when possible.

Links:

CVE(s):