TUCoPS :: Web :: Apps :: psit.htm

Processit.pl - environment and setup variables can be viewed
Vulnerability

    processit.pl

Affected

    processit.pl

Description

    UkR hacking team found following.  Environment and Setup Variables
    can be Viewed through processit.pl CGI script.

    The script allows  several environment variables  to be viewed  by
    the attacker, who can gain useful information on the site,  making
    further attacks more feasible.

    processit.pl  dumps  useful  information  (e.g.  script  location,
    SERVER_SOFTWARE,  DOCUMENT_ROOT,  etc.)  to  the  browser when the
    requested  file  provided  is  incorrect  or  when request without
    parametrs.

    If site does not contain a incorrect file, thus the following  URL
    displays  the  environment  dump.   However,  a  similar url, when
    applied within the necessary modifications to an unprotected  site
    would yield the desired result:

        http://www.victim.org/cgi-bin/processit.pl?FORMNAME=UkR

    or

        http://www.victim.org/cgi-bin/processit.pl

Solution

    Nothing yet.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH