TUCoPS :: Web :: Apps :: mhtml.htm

MultiHTML allows SSI calls to retrieve arbitrary files
Vulnerability

    MultiHTML

Affected

    MultiHTML

Description

    Niels Heinen found following.  MultiHTML allows you to put an  SSI
    call  where  you  want  the  HTML  file  to be displayed.  The SSI
    executes the MultiHTML program  which displays whatever HTML  file
    you have it set to display.   The main reason fpr posting this  is
    because  of  the  fact  that   this  script  is  offerd  by   many
    lets-expand-our-cgi-bins-to-make-us-look-good isp's.

    The cgi script checks the extentions of the requested file to  see
    if it is ok.  This easily can be tricked by using %00 (Olaf Kirch)

        http://localhost/cgi-bin/multihtml.pl?multi=/etc/passwd%00html

    further their is no dcumentroot  specified in the script so  we do
    not need to use the ../../  here because their is access to  every
    directory on the system in question  (lame).  Even if their was  a
    documentroot and they  would filter the  dots then you  would have
    to  make  sure  that  the  script  does  not  contain  any  higher
    directory's.   Because the  open(FILE, "$multi")  functions in the
    script makes it easy to bypass .htaccess files.


Solution

    Be a  man and  learn how  to use  ssi without  a script.   Or  beg
    someone to write a new one.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH