[5392] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Security flaw in Count.cgi (wwwcount)

daemon@ATHENA.MIT.EDU (Jaroslav Benkovsky)
Tue Oct 14 12:08:17 1997

Date: 	Mon, 13 Oct 1997 18:21:52 +0200
Reply-To: benkovsk@PHA.PVT.CZ
From: Jaroslav Benkovsky <benkovsk@PHA.PVT.CZ>
To: BUGTRAQ@NETSPACE.ORG

Razvan Dragomirescu wrote:
>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> Hi all,
>
> I have found a vulnerability in Muhammad A. Muquit's wwwcount version 2.3
> which allows remote users to read any GIF file on the server,
...

Temporary and very dirty fix is to apply something like

          case SHOW_GIF_FILE:
          {
+             PrintHeader();
+             StringImage("Images have been disabled");
+             exit(1);
+
              if (*digit_info.gif_file == '\0')
              {
                  PrintHeader();

to wwwcount2.3/main.c

(stupid, but maybe it helps to somebody). Btw, counter sources
are careless in many other cases.

I'm sorry if this seems stupid to you

                                        Edheldil

home help back first fref pref prev next nref lref last post