[22562] in bugtraq

home help back first fref pref prev next nref lref last post

*** Security Advisory *** Power UP HTML

daemon@ATHENA.MIT.EDU (Steve Shepherd)
Fri Sep 7 14:10:56 2001

Message-ID: <3B990A97.6040807@valueweb.com>
Date: Fri, 07 Sep 2001 13:57:43 -0400
From: Steve Shepherd <steven@valueweb.com>
MIME-Version: 1.0
To: bugtraq@securityfocus.com
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit

Security Advisory - 07 Sept 2001

Power Up HTML 0.8033beta 8/16/00
Programmed by Randy Parker

*** View / Execute Arbitrary Code Using Program ***


Overview:
---------

Power Up HTML provides a central routing point which greatly extends the 
simplicity of programming and the ability to customize other CGI 
scripts. With this great simplification, you should soon see a large 
number of useful add-on programs to do anything from managing guestbooks 
to full-featured chat programs.  However, the "router" piece of the code 
allows the viewing of files on the server as well as the execution of 
arbitrary code.


Description:
------------

Within this software package, the primary script, r.pl (or r.cgi) exists 
  and is what is exploitable. Example:

/cgi-bin/powerup/r.cgi?FILE=main.html


System files can be viewed by simply entering relative path information:

/cgi-bin/powerup/r.cgi?FILE=../../../../../etc/passwd


Additionally, arbitrary code can be executed on the server utilizing 
this script.



Versions Affected:
------------------

0.8033beta



Solution
--------

I received no response from the Author after multiple e-mails notifying 
him of the exploit.


home help back first fref pref prev next nref lref last post