what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

MultiHTML.txt

MultiHTML.txt
Posted Sep 15, 2000
Authored by Niels Heinen

MultiHTML (/cgi-bin/multihtml.pl)is a CGI script which has a vulnerability allowing remote users to read any file on the webserver.

tags | exploit, remote, cgi
SHA-256 | 228cf3036d6dc675782ffe1ed3fbd4cb7b47b8d64048d18536d2852fc1ee1bf8

MultiHTML.txt

Change Mirror Download
Title :                     MultiHTML vulnerability.
Description : Retrieve files from the server.
Vendor status : Notified and a new (not much improved) script is released.


Short description of the tool:
==============================

MultiHTML allows you to put an SSI call where you want the HTML file to
be displayed.
The SSI executes the MultiHTML program which displays whatever HTML file
you have it set to
display. The main reason i'm posting this is because of the fact that
this script is offerd
by many lets-expand-our-cgi-bins-to-make-us-look-good isp's.


The problems
============

The cgi script checks the extentions of the requested file to see if it
is ok. This easily can be
tricked by using %00 ( Olaf Kirch )

http://localhost/cgi-bin/multihtml.pl?multi=/etc/passwd%00html

further their is no dcumentroot specified in the script so we do not
need to use the ../../ here
because their is access to every directory on the system in question
(lame). Even if their was a
documentroot and they would filter the dots then you would have to make
sure that the script does
not contain any higher directory's. Because the open(FILE, "$multi")
functions in the script makes
it easy to bypass .htaccess files.


The solution:
=============

Be a man and learn how to use ssi without a script. Or beg someone to
write a new one ;)


Greets


zillion

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close