https://www.exploit-db.com/exploits/20246
TalentSoft Web+ Application Server (Linux) 4.6 - Example Script File Disclosure






漏洞ID | 1053460 | 漏洞类型 | |
发布时间 | 2000-09-26 | 更新时间 | 2000-09-26 |
![]() |
N/A | ![]() |
N/A |
漏洞平台 | Linux | CVSS评分 | N/A |
|漏洞来源
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/1725/info
Web+ is a development language for use in creating web-based client/server applications.
In Linux versions of the product, an example script installed in Web+ (Web+Ping) which fails to correctly filter shell meta characters. As a result, parameters passed to this script may contain malicious shell commands, allowing an attacker to remotely execute or read any file which is accessible by the Web+ user.
Windows NT versions of Web+ are apparently not vulnerable.
To exploit simply place a '|' after the parameter you which to provide to
ping and then the command you wish to execute.
e.g:
Goto:
http://target/cgi-bin/webplus.cgi?Script=/webplus/webping/webping.wml
Then type in host destination box:
127.0.0.1 | cat /etc/passwd
You will then be presented with the contents of the /etc/passwd file.
检索漏洞
开始时间
结束时间