CVE-2000-0010: WebWho+ whois.cgi program allows remote attackers to execute commands via shell metacharacters in th
WebWho+ whois.cgi program allows remote attackers to execute commands via shell metacharacters in the TLD parameter.
AI Analysis
Technical Summary
CVE-2000-0010 is a critical remote code execution vulnerability found in the WebWho+ software, specifically in the whois.cgi program version 1.1. This vulnerability arises due to improper input sanitization of the 'TLD' (Top-Level Domain) parameter, which is passed to the underlying shell without adequate filtering. Attackers can inject shell metacharacters into this parameter, enabling them to execute arbitrary commands on the vulnerable server remotely without any authentication. The vulnerability is remotely exploitable over the network (AV:N), requires no authentication (Au:N), and has low attack complexity (AC:L). Successful exploitation compromises confidentiality, integrity, and availability (C:C/I:C/A:C) of the affected system, allowing attackers to potentially take full control of the server hosting the WebWho+ application. Since the vulnerability dates back to 1999 and no patch is available, it indicates that the software is either deprecated or abandoned, increasing the risk for systems still running this version. Although no known exploits in the wild have been reported, the severity and ease of exploitation make this a critical threat if the software is still in use. The vulnerability affects only version 1.1 of WebWho+, a tool used for querying whois information via a web interface, which may be deployed in niche or legacy environments.
Potential Impact
For European organizations, the impact of this vulnerability can be significant if WebWho+ 1.1 is still in use, particularly in legacy systems or specialized network infrastructure. Exploitation could lead to full system compromise, allowing attackers to steal sensitive data, disrupt services, or use the compromised server as a foothold for further attacks within the network. This is particularly concerning for organizations handling critical infrastructure, government data, or private sector entities with sensitive customer information. The lack of patches means organizations must rely on mitigation or replacement strategies. The vulnerability could also be leveraged to launch attacks on other internal systems, leading to widespread operational disruption. Given the critical nature of the flaw, any exposed WebWho+ installations represent a high-value target for attackers aiming to gain unauthorized access or disrupt services.
Mitigation Recommendations
Since no official patch is available for WebWho+ 1.1, European organizations should prioritize the following specific mitigation steps: 1) Immediately identify and inventory all systems running WebWho+ 1.1 using network scanning and asset management tools. 2) Remove or disable the whois.cgi script or the entire WebWho+ application if it is not essential. 3) If the application must remain operational, implement strict input validation and sanitization at the web server or application firewall level to block shell metacharacters in the TLD parameter. 4) Employ web application firewalls (WAFs) with custom rules to detect and block exploitation attempts targeting the whois.cgi script. 5) Isolate affected systems from critical network segments to limit potential lateral movement. 6) Monitor logs for suspicious activity related to whois.cgi requests and unusual command execution patterns. 7) Consider migrating to modern, supported whois query tools that do not have this vulnerability. 8) Educate IT staff about the risks of legacy software and the importance of timely upgrades or decommissioning vulnerable applications.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2000-0010: WebWho+ whois.cgi program allows remote attackers to execute commands via shell metacharacters in th
Description
WebWho+ whois.cgi program allows remote attackers to execute commands via shell metacharacters in the TLD parameter.
AI-Powered Analysis
Technical Analysis
CVE-2000-0010 is a critical remote code execution vulnerability found in the WebWho+ software, specifically in the whois.cgi program version 1.1. This vulnerability arises due to improper input sanitization of the 'TLD' (Top-Level Domain) parameter, which is passed to the underlying shell without adequate filtering. Attackers can inject shell metacharacters into this parameter, enabling them to execute arbitrary commands on the vulnerable server remotely without any authentication. The vulnerability is remotely exploitable over the network (AV:N), requires no authentication (Au:N), and has low attack complexity (AC:L). Successful exploitation compromises confidentiality, integrity, and availability (C:C/I:C/A:C) of the affected system, allowing attackers to potentially take full control of the server hosting the WebWho+ application. Since the vulnerability dates back to 1999 and no patch is available, it indicates that the software is either deprecated or abandoned, increasing the risk for systems still running this version. Although no known exploits in the wild have been reported, the severity and ease of exploitation make this a critical threat if the software is still in use. The vulnerability affects only version 1.1 of WebWho+, a tool used for querying whois information via a web interface, which may be deployed in niche or legacy environments.
Potential Impact
For European organizations, the impact of this vulnerability can be significant if WebWho+ 1.1 is still in use, particularly in legacy systems or specialized network infrastructure. Exploitation could lead to full system compromise, allowing attackers to steal sensitive data, disrupt services, or use the compromised server as a foothold for further attacks within the network. This is particularly concerning for organizations handling critical infrastructure, government data, or private sector entities with sensitive customer information. The lack of patches means organizations must rely on mitigation or replacement strategies. The vulnerability could also be leveraged to launch attacks on other internal systems, leading to widespread operational disruption. Given the critical nature of the flaw, any exposed WebWho+ installations represent a high-value target for attackers aiming to gain unauthorized access or disrupt services.
Mitigation Recommendations
Since no official patch is available for WebWho+ 1.1, European organizations should prioritize the following specific mitigation steps: 1) Immediately identify and inventory all systems running WebWho+ 1.1 using network scanning and asset management tools. 2) Remove or disable the whois.cgi script or the entire WebWho+ application if it is not essential. 3) If the application must remain operational, implement strict input validation and sanitization at the web server or application firewall level to block shell metacharacters in the TLD parameter. 4) Employ web application firewalls (WAFs) with custom rules to detect and block exploitation attempts targeting the whois.cgi script. 5) Isolate affected systems from critical network segments to limit potential lateral movement. 6) Monitor logs for suspicious activity related to whois.cgi requests and unusual command execution patterns. 7) Consider migrating to modern, supported whois query tools that do not have this vulnerability. 8) Educate IT staff about the risks of legacy software and the importance of timely upgrades or decommissioning vulnerable applications.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Threat ID: 682ca32cb6fd31d6ed7df571
Added to database: 5/20/2025, 3:43:40 PM
Last enriched: 6/25/2025, 5:44:11 PM
Last updated: 7/26/2025, 5:59:14 AM
Views: 14
Related Threats
CVE-2025-5391: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bbioon WooCommerce Purchase Orders
HighCVE-2025-42976: CWE-125: Out-of-bounds Read in SAP_SE SAP NetWeaver Application Server ABAP (BIC Document)
HighCVE-2025-42951: CWE-863: Incorrect Authorization in SAP_SE SAP Business One (SLD)
HighCVE-2025-55161: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-25235: CWE-918 Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.