Overview
There is an input validation error in the stand-alone SOAP server XMMS Remote which allows unauthorized remote command execution.
Description
| XMMS Remote is a stand-alone XML/SOAP HTTP server implemented in PERL created by X2 Studios. It is used to monitor a running xmms media player client, typically on Mac OS X systems, but it appears to be easily ported to multiple platforms. (xmms, the X Multimedia System, is an audio player for X) The PERL module XMMS.pm contains an input validation error which allows arbitrary commands received from a network port (8086/tcp by default) to be executed in the command shell running the service. DetailsIn XMMS.pm, calls to the PERL function system()were passed in unfiltered: | 
Impact
| Unauthorized remote command execution with the privileges of the XMMS Remote service (note: not typically a privileged account). | 
Solution
| Update to a non-vulnerable version of XMMS.pm (created after May 07, 2003 - 1:40PM PST): | 
| WorkaroundsBlock external access to the XML/SOAP service being offered by XMMS Remote, port 8086/tcp by default. | 
Vendor Information
CVSS Metrics
| Group | Score | Vector | 
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental | 
References
Acknowledgements
Credit to Chris Dolan for reporting this vulnerability to X2 Studios.
This document was written by Jeffrey S. Havrilla
Other Information
| CVE IDs: | None | 
| Severity Metric: | 1.62 | 
| Date Public: | 2003-05-07 | 
| Date First Published: | 2003-05-14 | 
| Date Last Updated: | 2003-05-15 14:33 UTC | 
| Document Revision: | 11 |