TUCoPS :: Web :: Servers :: ssi.htm

Web servers that support SSI execute arbitrary code
Vulnerability

    ?

Affected

    System running Web servers that support SSI.

Description

    Leonid S.  Knyshov  wrote  that  if  you  run  that script with no
    filters on the  web server that  has SSI support,  you are in  the
    world for _serious_ trouble, such  as <--#exec cmd "rm -rf  /" -->
    (Note:  He  don't  remember  the  exact  SSI  syntax,  since it is
    disabled)

    Anything after cmd is exec'ed by a shell forked as the UID of  the
    httpd...  God save you if you run httpd as root in that case...

Solution

    Disable SSI.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH