Name: Environment and Setup Variables can be Viewed through
webpage.cgi
Date: 28.01.2001
Problems:The script allows several environment variables to
be viewed by the attacker, who can gain useful information
on the site, making further attacks more feasible.
Analysis:webpage.cgi dumps useful information (e.g. script
location, HTTP root, version of Perl, server_admin,
server_name, path) to the browser when the database file
provided is incorrect. Exploits: If site does not contain a
file named ukr.htm, thus the following URL displays the
environment dump (note: this url may not work as the vendor
has applied the patch to the site. However, a similar url,
when applied within the necessary modifications to an
unprotected site would yield the desired result.)
Author: UkR_XblP
Exploit: http://www.victim.org/cgi-bin/replicator/webpage.cgi/313373/ukr.htm
Get your free e-mail address at http://www.zmail.ru

Reply via email to