Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0985: CC Whois program whois.cgi allows remote attackers to execute commands via shell metacharacters in t

0
High
VulnerabilityCVE-1999-0985cve-1999-0985
Published: Tue Nov 09 1999 (11/09/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: cc
Product: cc_whois

Description

CC Whois program whois.cgi allows remote attackers to execute commands via shell metacharacters in the domain entry.

AI-Powered Analysis

AILast updated: 06/27/2025, 11:35:02 UTC

Technical Analysis

CVE-1999-0985 is a high-severity remote command execution vulnerability found in version 1.0 of the CC Whois program, specifically in the whois.cgi script. The vulnerability arises because the whois.cgi script fails to properly sanitize user input in the domain entry field, allowing an attacker to inject shell metacharacters. This injection enables the attacker to execute arbitrary commands on the underlying server with the privileges of the web server process. The vulnerability is exploitable remotely over the network without any authentication, making it highly accessible to attackers. The CVSS v2 score of 7.5 reflects the critical nature of this flaw, with impacts on confidentiality, integrity, and availability. Exploitation could lead to unauthorized disclosure of sensitive information, modification or destruction of data, and disruption of service. Although no patches are available and no known exploits have been reported in the wild, the vulnerability remains a significant risk for any systems still running this outdated software. Given the age of the vulnerability (published in 1999), it is likely that modern environments have moved away from this software; however, legacy systems or archival servers may still be at risk. The root cause is improper input validation and command execution via shell calls in CGI scripts, a common security issue in early web applications.

Potential Impact

For European organizations, the impact of this vulnerability could be severe if legacy systems running CC Whois 1.0 are still in use, particularly in academic, governmental, or network infrastructure environments where Whois services might be maintained for historical or operational reasons. Successful exploitation could lead to full system compromise, allowing attackers to steal sensitive data, disrupt network services, or use compromised servers as a foothold for further attacks within the organization. This could result in data breaches, operational downtime, and reputational damage. Given the remote and unauthenticated nature of the exploit, attackers could scan for vulnerable servers across Europe and execute commands without any user interaction, increasing the risk of automated attacks. The lack of available patches means organizations must rely on alternative mitigation strategies, increasing operational complexity. Additionally, compliance with European data protection regulations such as GDPR could be jeopardized if personal or sensitive data is exposed due to exploitation.

Mitigation Recommendations

Since no official patches are available for CC Whois 1.0, European organizations should prioritize the following mitigation steps: 1) Immediate identification and inventory of any systems running CC Whois 1.0 or the vulnerable whois.cgi script. 2) Decommission or isolate vulnerable systems from the internet and internal networks to prevent exploitation. 3) Replace the vulnerable Whois service with modern, actively maintained alternatives that follow secure coding practices and input validation. 4) If the service must remain operational, implement strict input validation and sanitization at the web server or application firewall level to block shell metacharacters and suspicious payloads targeting the domain entry field. 5) Employ network-level protections such as Web Application Firewalls (WAFs) configured to detect and block command injection attempts. 6) Monitor logs for unusual command execution patterns or unexpected process spawning from the whois.cgi script. 7) Educate system administrators about the risks of legacy CGI scripts and the importance of timely software updates and secure coding practices. 8) Consider network segmentation and least privilege principles to limit the impact of potential compromises.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32cb6fd31d6ed7df3c1

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 6/27/2025, 11:35:02 AM

Last updated: 2/7/2026, 5:16:07 PM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats