CGI-World Poll远程泄漏文件内容漏洞

CGI-World Poll远程泄漏文件内容漏洞

漏洞ID 1105908 漏洞类型 未知
发布时间 2000-07-04 更新时间 2005-05-02
图片[1]-CGI-World Poll远程泄漏文件内容漏洞-安全小百科CVE编号 CVE-2000-0590
图片[2]-CGI-World Poll远程泄漏文件内容漏洞-安全小百科CNNVD-ID CNNVD-200007-005
漏洞平台 CGI CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/20059
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200007-005
|漏洞详情
Poll是一个用PERL编写的CGI程序,用于在网站上进行投票。2.0版本的Poll存在一个问题可能会导致系统目录中的文件内容泄露。Poll的Poll_It_SSI_v2.0.cgi程序可接受很多变量,这些变量可以被远程用户在提交的HTTP请求中控制,但是Poll并没有很好的限制这些输入的变量,可以用来查看系统中任意文件内容。恶意用户可以在data_dir参数中指定要查看的文件。
|漏洞EXP
source: http://www.securityfocus.com/bid/1431/info

Poll It is a Perl CGI application used to create and maintain opinion polls on websites. The program relies on a number of internal variables. These variables can be overwritten by any remote user by specifying the new value as a variable in the GET request. This is due to the fact that Poll It overwrites variables to user-supplied values after it sets them to the internally-specified defaults.

This can lead to unauthorized file reads, as well as potentially other compromises. 

http: //target/cgi-bin/pollit/Poll_It_SSI_v2.0.cgi?data_dir=/etc/passwd%00
|参考资料

来源:BID
名称:1431
链接:http://www.securityfocus.com/bid/1431
来源:BUGTRAQ
名称:20000706VulnerabilityinPoll_Itcgiv2.0
链接:http://archives.neohapsis.com/archives/bugtraq/2000-07/0076.html
来源:XF
名称:http-cgi-pollit-variable-overwrite(4878)
链接:http://xforce.iss.net/static/4878.php
来源:NSFOCUS
名称:652
链接:http://www.nsfocus.net/vulndb/652

相关推荐: phpWebSite 0.7.3/0.8.x/0.9.3 – User Module HTTP Response Splitting

phpWebSite 0.7.3/0.8.x/0.9.3 – User Module HTTP Response Splitting 漏洞ID 1054739 漏洞类型 发布时间 2004-11-04 更新时间 2004-11-04 CVE编号 N/A CNN…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享