|
Description
|
|
Multiple vulnerabilities have been identified in ContentKeeper Web, which could be exploited by attackers to compromise a vulnerable system.
The first issue is caused by an error in the "cgi-bin/ck/mimencode" script that does not validate user-supplied POST requests before being written to a default file with insecure permissions (777), which could be exploited by attackers to inject and execute arbitrary code (e.g. Perl) with the privileges of the web server.
The second issue is caused by an error in the setuid root utility "benetool" when calling "ps", which could allow privilege escalation to "root".
|