Exploit CGI City CC Whois 1.0 - MetaCharacter

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
20433
Проверка EDB
  1. Пройдено
Автор
CODY T. - HHP
Тип уязвимости
REMOTE
Платформа
CGI
CVE
cve-1999-0985
Дата публикации
1999-11-09
Код:
source: https://www.securityfocus.com/bid/2000/info

Whois scripts provide InterNIC lookup services via HTTP. The vulnerable scripts include versions of Matt's Whois and CGI City Whois. Older versions of these fail to filter metacharacters, allowing execution of arbitrary commands by embedding the commands in the domain name to lookup. Specifically, the UNIX command separation character ";" can be used to execute commands. Successful exploitation of this vulnerability would allow an attacker to execute commands with the privileges of the web server process, which could result in retrieval of sensitive information, web defacements, etc. 

Depending on the specific script used, the following syntaxes have been shown to allow intrusion:

1) ;command
2) ";command
3) ;command;
 
Источник
www.exploit-db.com

Похожие темы