Un-CGI 1.9 and earlier does not verify that a CGI script has the execution bits set before executing it, which allows remote attackers to execute arbitrary commands by directing Un-CGI to a document that begins with "#!" and the desired program name.
| Software | From | Fixed in |
|---|---|---|
| steve_grimm / un-cgi | 1.3 | 1.3.x |
| steve_grimm / un-cgi | 1.2 | 1.2.x |
| steve_grimm / un-cgi | 1.7 | 1.7.x |
| steve_grimm / un-cgi | 1.6.2 | 1.6.2.x |
| steve_grimm / un-cgi | 1.5 | 1.5.x |
| steve_grimm / un-cgi | 1.4 | 1.4.x |
| steve_grimm / un-cgi | 1.0 | 1.0.x |
| steve_grimm / un-cgi | 1.9 | 1.9.x |
| steve_grimm / un-cgi | 1.1 | 1.1.x |
| steve_grimm / un-cgi | 1.8 | 1.8.x |
| steve_grimm / un-cgi | 1.6.1 | 1.6.1.x |
| steve_grimm / un-cgi | 1.6 | 1.6.x |