Lynx 2.8.5, and other versions before 2.8.6dev.15, allows remote attackers to execute arbitrary commands via (1) lynxcgi:, (2) lynxexec, and (3) lynxprog links, which are not properly restricted in the default configuration in some environments.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Lynx | University_of_kansas | 2.8.5 (including) | 2.8.5 (including) |
Lynx | University_of_kansas | 2.8.6 (including) | 2.8.6 (including) |
Lynx | University_of_kansas | 2.8.6_dev13 (including) | 2.8.6_dev13 (including) |
Red Hat Enterprise Linux 3 | RedHat | lynx-0:2.8.5-11.2 | * |
Red Hat Enterprise Linux 4 | RedHat | lynx-0:2.8.5-18.2 | * |