[5008] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: Recent attacks

daemon@ATHENA.MIT.EDU (Steffan Henke)
Wed Apr 9 19:57:43 1997

Date: Wed, 9 Apr 1997 22:33:19 +0200 (MET DST)
From: Steffan Henke <henker@informatik.uni-bremen.de>
To: David Low <C-Low@mail.dec.com>
cc: "'www-security@ns2.rutgers.edu'" <www-security@ns2.rutgers.edu>
In-Reply-To: <c=US%a=_%p=Digital%l=KAOEXC2-970408151030Z-5980@pkohub1.athena.pko.dec.com>
Errors-To: owner-www-security@ns2.rutgers.edu

On Tue, 8 Apr 1997, David Low wrote:

> tends to use the test-cgi that come packaged with apache in order to

Most users remove the test-cgi and printenv scripts after a successfull
installation. On NCSA (at least till 1.3) this was a rather big problem
because you could gain information about arbitrary files, e.g., have a
look what was installed in /cgi-bin... However, there are still a lot of
these servers online nowadays.

> may want to remove execute privs from this CGI. He also goes after
> rfh.cgi which I am not sure what it is (since its not on my system).
> Anyone know what this does/how it can be used to gain information/access
> to a machine?

I don't know about rfh.cgi but if you mean phf.cgi I get a clue.

Regards,

Steffan

... Our continuing mission: To seek out knowledge of C, to explore
strange UNIX commands, and to boldly code where no one has man page 4.


home help back first fref pref prev next nref lref last post