[5392] in bugtraq
Re: Security flaw in Count.cgi (wwwcount)
daemon@ATHENA.MIT.EDU (Jaroslav Benkovsky)
Tue Oct 14 12:08:17 1997
Date: Mon, 13 Oct 1997 18:21:52 +0200
Reply-To: benkovsk@PHA.PVT.CZ
From: Jaroslav Benkovsky <benkovsk@PHA.PVT.CZ>
To: BUGTRAQ@NETSPACE.ORG
Razvan Dragomirescu wrote:
>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> Hi all,
>
> I have found a vulnerability in Muhammad A. Muquit's wwwcount version 2.3
> which allows remote users to read any GIF file on the server,
...
Temporary and very dirty fix is to apply something like
case SHOW_GIF_FILE:
{
+ PrintHeader();
+ StringImage("Images have been disabled");
+ exit(1);
+
if (*digit_info.gif_file == '\0')
{
PrintHeader();
to wwwcount2.3/main.c
(stupid, but maybe it helps to somebody). Btw, counter sources
are careless in many other cases.
I'm sorry if this seems stupid to you
Edheldil