Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2009-4489Improper Input Validation in Cherokee

Severity
5.0MEDIUMNVD
EPSS
8.3%
top 7.73%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJan 13
Latest updateMay 2

Description

header.c in Cherokee before 0.99.32 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.

CVSS vector

AV:N/AC:L/C:P/I:N/A:NExploitability: 10.0 | Impact: 2.9

Affected Packages1 packages

Patches

🔴Vulnerability Details

2
GHSA
GHSA-8cwp-32mr-53q5: header2022-05-02
CVEList
CVE-2009-4489: header2010-01-13

💥Exploits & PoCs

1
Exploit-DB
Cherokee 0.99.30 - Terminal Escape Sequence in Logs Command Injection2010-01-11
CVE-2009-4489 — Improper Input Validation in Cherokee | cvebase