2nd Nov 2001 [SBWID-4834]
COMMAND
viralator
SYSTEMS AFFECTED
viralator 0.7, 0.8 and 0.9pre1
PROBLEM
Peter Conrad reported following on viralator, a perl-script to be used
with the squid proxy, an apache webserver and some virus scanner
software. Its purpose is to allow scanning of files downloaded through
the proxy for viruses.
The URL of the file being downloaded is passed as a parameter to the
viralator CGI script. This URL is used in an insecure way to download
the file using the \"wget\" utility. After that, the filename part of
the URL is used in an insecure way to scan the file for a virus.
Accordingly with Pekka Ahmavuo, the following url:
http://foo/%22%3btouch%20foo%3b.zip
will create a file \"foo\" in the proxy\'s cgi-bin directory. The
filename written without url encoding is: \";touch foo;.zip. It is
trivial to use any other command instead of \"touch foo\".
SOLUTION
No patch available yet.
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH