Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Format string on URI
Information
Severity
Severity
Critical
Family
Family
Gain a shell remotely
CVSSv2 Base
CVSSv2 Base
10.0
CVSSv2 Vector
CVSSv2 Vector
AV:N/AC:L/Au:N/C:C/I:C/A:C
Solution Type
Solution Type
Vendor Patch
Created
Created
18 years ago
Modified
Modified
4 years ago
Summary
The remote web server seems to be vulnerable to a format string attack on the URI. An attacker might use this flaw to make it crash or even execute arbitrary code on this host.
Insight
Insight
Flaw is due to the application fails to properly sanitize user-supplied input before including it in the format-specifier argument of a formatted-printing function.
Detection Method
Detection Method
Send a crafted request via HTTP GET and check whether the server is vulnerable to format string attack.
Solution
Solution
Upgrade your software or contact your vendor and inform him of this vulnerability.