Greg Matthews Classifieds.cgi远程读取任意文件漏洞

Greg Matthews Classifieds.cgi远程读取任意文件漏洞

漏洞ID 1105406 漏洞类型 输入验证
发布时间 1998-12-15 更新时间 2005-05-02
图片[1]-Greg Matthews Classifieds.cgi远程读取任意文件漏洞-安全小百科CVE编号 CVE-1999-0934
图片[2]-Greg Matthews Classifieds.cgi远程读取任意文件漏洞-安全小百科CNNVD-ID CNNVD-199912-052
漏洞平台 CGI CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/20444
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-199912-052
|漏洞详情
classifieds.cgi是一个用来在Web页面上放置分类广告的perl脚本,由GregMathews维护。classifieds.cgi脚本对用户输入未做充分过滤,导致允许远程用户可能以httpd进程的权限读取Web服务器上的任意有权限读取的文件。漏洞发现者未公布具体漏洞细节。<*链接:http://online.securityfocus.com/bid/2020/info/http://xforce.iss.net/static/3102.php*>
|漏洞EXP
source: http://www.securityfocus.com/bid/2020/info

Classifieds.cgi is a perl script (part of the classifieds package by Greg Matthews) which provides simple classified ads to web sites. Due to improper input validation it can be used to read files on the host machine, with the privileges of the web server. This can be accomplished by embedding the input redirection metacharacter along with a filename into the form field used for e-mail address entry (<input name=return>). Any file that the web server process has read access to can be retrieved. 

Submit email@host</etc/passwd as e-mail address.
|参考资料

来源:XF
名称:http-cgi-classifieds-read(3102)
链接:http://xforce.iss.net/xforce/xfdb/3102
来源:BID
名称:2020
链接:http://www.securityfocus.com/bid/2020
来源:NSFOCUS
名称:3208
链接:http://www.nsfocus.net/vulndb/3208

相关推荐: eEye SecureIIS

eEye SecureIIS 漏洞ID 1205450 漏洞类型 未知 发布时间 2001-08-14 更新时间 2001-08-14 CVE编号 CVE-2001-0524 CNNVD-ID CNNVD-200108-070 漏洞平台 N/A CVSS评分 …

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享