|
Vulnerability whois.cgi, ping.cgi, traceroute.cgi and finger.cgi Affected Fastgraf CGI colllection Description Marco van Berkum found following. The whois.cgi script of Fastgraf has almost no metacharcterchecking which enables attackers to execute commands as uid of the webserver. The metacharcterbug in the script: $FORM{'host'} =~ s/(\;)//g; As you can see only the ";" gets deleted. So attackers are still able to use pipes, redirectioncharacters and so on. ping.cgi, traceroute.cgi and finger.cgi have the same bug. Solution Change the filtering to: $FORM{'host'} =~ s/(\W)/\\$1/g; The author has been notified to correct this problem.