FitNesse is vulnerable to an arbitrary command execution vulnerability, whereby an attacker can pass malicious input to the “pageContent” POST parameter. This parameter is not properly sanitized before being used to execute commands, thereby allowing an attacker to arbitrarily execute commands within the context of the web server.
FitNesse v20131110 and possibly other versions
Remote Code Execution
Exploitation of this vulnerability (arbitrary command execution) is possible through the use of methods like drive-by attacks. Remote attackers who successfully exploit this vulnerability will be able to execute commands on the vulnerable system with the same rights as the web server.
BeyondTrust Prevention and Detection:
BeyondTrust's Retina® Network Security Scanner scans devices to detect for this vulnerability.
- 33032 - FitNesse Arbitrary Command Execution Vulnerability (20131123) (Zero-Day)
No mitigation currently available. Avoid using FitNesse when possible.