[20278] in bugtraq

home help back first fref pref prev next nref lref last post

Re: new advisory

daemon@ATHENA.MIT.EDU (dynamo)
Tue Apr 17 16:27:25 2001

MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-ID:  <Pine.SOL.4.33.0104160944530.14831-100000@pandora.harvard.net>
Date:         Mon, 16 Apr 2001 09:45:50 -0400
Reply-To: dynamo <dynamo@IME.NET>
From: dynamo <dynamo@IME.NET>
X-To:         UkR hacking team <ukrteam@ukr.net>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <200104150213.FAA45157@fatlady.ukr.net>

Am i missing something, or is there no vendor information listed in this?

Who wrote processit.pl, and what package is it a part of?

On Sun, 15 Apr 2001, UkR hacking team wrote:

> Name: Environment and Setup Variables can be Viewed through processit.pl CGI script
> Author: UkR-XblP /UkR security team:www.ukrteam.ru /GiN group:www.secure.f2s.com
> Problems:The script allows several environment variables to be viewed by the attacker, who can gain useful information on the site, making further attacks more feasible
> Analysis:processit.pl dumps useful information (e.g. script location, SERVER_SOFTWARE, DOCUMENT_ROOT, etc.) to the browser when the requested file provided is incorrect or when request without parametrs.
> Exploits: If site does not contain a incorrect file, thus the following URL displays the environment dump. However, a similar url, when applied within the necessary modifications to an unprotected site would yield the desired result:
> http://www.victim.org/cgi-bin/processit.pl?FORMNAME=UkR
> or
> http://www.victim.org/cgi-bin/processit.pl
>

home help back first fref pref prev next nref lref last post