Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0147: The aglimpse CGI program of the Glimpse package allows remote execution of arbitrary commands.

0
High
VulnerabilityCVE-1999-0147cve-1999-0147
Published: Tue Jul 01 1997 (07/01/1997, 04:00:00 UTC)
Source: NVD
Vendor/Project: university_of_arizona
Product: glimpse_http

Description

The aglimpse CGI program of the Glimpse package allows remote execution of arbitrary commands.

AI-Powered Analysis

AILast updated: 07/01/2025, 07:39:34 UTC

Technical Analysis

CVE-1999-0147 is a high-severity vulnerability found in the aglimpse CGI program, which is part of the Glimpse package version 2.0. The vulnerability allows remote attackers to execute arbitrary commands on the affected system without any authentication or user interaction. Specifically, the aglimpse CGI script improperly handles user input, enabling attackers to inject and execute system-level commands remotely. This results in a complete compromise of the confidentiality, integrity, and availability of the affected system. The vulnerability is remotely exploitable over the network (AV:N), requires no authentication (Au:N), and can be exploited with low attack complexity (AC:L). The impact includes potential unauthorized data disclosure, modification or deletion of data, and disruption or takeover of the affected server. Given that the Glimpse package was historically used as a search engine or indexing tool on web servers, exploitation could allow attackers to gain control over web infrastructure or pivot to other internal systems. No official patches or fixes are available for this vulnerability, and no known exploits have been reported in the wild, likely due to the age of the software and its limited current usage. However, legacy systems or environments still running Glimpse 2.0 remain at risk.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on whether legacy systems running Glimpse 2.0 are still in operation. If present, exploitation could lead to unauthorized remote code execution, allowing attackers to compromise sensitive data, disrupt services, or use the affected servers as footholds for further attacks within the network. This could affect confidentiality of personal or corporate data, integrity of critical systems, and availability of web services. Given the high CVSS score (7.5) and the lack of authentication requirements, the risk is significant for any exposed systems. European organizations in sectors with legacy infrastructure—such as academia, research institutions, or government agencies that may have historical deployments of Glimpse—are particularly vulnerable. The absence of patches means organizations must rely on mitigation strategies or system upgrades to reduce risk. Additionally, compliance with European data protection regulations (e.g., GDPR) could be jeopardized if exploitation leads to data breaches.

Mitigation Recommendations

Since no official patches are available for this vulnerability, European organizations should take the following specific steps: 1) Identify and inventory any systems running Glimpse 2.0, especially those exposing the aglimpse CGI program to external networks. 2) Immediately disable or remove the aglimpse CGI component or the entire Glimpse package if it is no longer required. 3) If removal is not feasible, restrict access to the affected CGI script using network-level controls such as firewalls, IP whitelisting, or VPNs to limit exposure to trusted users only. 4) Employ web application firewalls (WAFs) with custom rules to detect and block command injection attempts targeting the aglimpse CGI interface. 5) Monitor logs and network traffic for suspicious activity indicative of exploitation attempts. 6) Consider migrating to modern, supported search and indexing solutions that do not have known vulnerabilities. 7) Conduct regular security audits and vulnerability assessments focusing on legacy web applications and CGI scripts. These targeted mitigations go beyond generic advice by focusing on legacy system identification, access restriction, and compensating controls.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32ab6fd31d6ed7de71f

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/1/2025, 7:39:34 AM

Last updated: 2/7/2026, 10:44:14 AM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats