Description
header.c in Cherokee before 0.99.32 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by evilaliv3 · textremotewindows
https://www.exploit-db.com/exploits/33501
References (7)
Core 7
Core References
Various Sources x_refsource_confirm
http://svn.cherokee-project.com/changeset/3977
Various Sources x_refsource_confirm
http://svn.cherokee-project.com/changeset/3944
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/37933
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2010/0090
Exploit, Patch vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/37715
Exploit x_refsource_misc
http://www.ush.it/team/ush/hack_httpd_escape/adv.txt
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/508830/100/0/threaded
Scores
EPSS
0.0829
EPSS Percentile
92.3%
Details
CWE
CWE-20
Status
published
Products (1)
cherokee-project/cherokee
< 0.99.31
Published
Jan 13, 2010
Tracked Since
Feb 18, 2026