Global is a source code tag system included in the NetBSD ports package. A vulnerability exists in versions 3.55 and prior that allows for an attacker to remotely execute commands. The problem occurs in the handling of quoted and escaped characters by the Common Gateway Interface script. An administrator can use the "htags -f" function to generate a CGI script that will provide the interface between the web server and the system. However, through the CGI, it is possible for a malicious user to pass a specially formatted string to the interface, resulting in the execution of a shell command.
Global is a source code tag system included in the NetBSD ports package. A vulnerability exists in versions 3.55 and prior that allows for an attacker to remotely execute commands. The problem occurs in the handling of quoted and escaped characters by the Common Gateway Interface script. An administrator can use the "htags -f" function to generate a CGI script that will provide the interface between the web server and the system. However, through the CGI, it is possible for a malicious user to pass a specially formatted string to the interface, resulting in the execution of a shell command.