[10875] in bugtraq

home help back first fref pref prev next nref lref last post

M1 website vulnerable

daemon@ATHENA.MIT.EDU (Spy eye)
Tue Jun 22 12:14:51 1999

Mime-Version: 1.0
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
Message-Id: <199906211109.HAA12775@netspace.org>
Date: 	Mon, 21 Jun 1999 07:07:45 -0400
Reply-To: Spy eye <eye@MAILANDNEWS.COM>
From: Spy eye <eye@MAILANDNEWS.COM>
To: BUGTRAQ@NETSPACE.ORG

https (http over ssl) is to provide secure connection, but for this website,
they are exposing their cgi scripts through https. The worst part of it is
their password checking scripts can be obtained. Bugs in the scripts maybe
exploited or loopholes in the password checking mechanism may be found.

M1 main page - http://www.m1.com.sg

CGI-script exposure:

https://www.m1.com.sg/m1/m1link/index.pl
https://www.m1.com.sg/m1/m1link/Include/match.pl
and possibly others.

Solution:
Reconfigure https server for proper operation.

Note:
I have given notice to M1 a few days back, but nothing has been done.

home help back first fref pref prev next nref lref last post