[15739] in bugtraq
Akopia MiniVend Piped Command Execution Vulnerability
daemon@ATHENA.MIT.EDU (Alfred Huger)
Wed Jul 12 12:28:19 2000
Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-Id: <Pine.GSO.4.21.0007111417390.921-100000@mail>
Date: Tue, 11 Jul 2000 14:19:43 -0700
Reply-To: Alfred Huger <ah@SECURITYFOCUS.COM>
From: Alfred Huger <ah@SECURITYFOCUS.COM>
To: BUGTRAQ@SECURITYFOCUS.COM
MiniVend version 4.04 and earlier come with a sample storefront which
contains a vulnerable piece of code. There are two related issues which
together allow for execution of commands with the privileges of the web
server. First, the file VIEW_PAGE.HTML does not parse input to check
for a pipe as part of an input filename. Second, UTIL.PM uses the perl
OPEN function in an insecure manner to check for the existence of the
file, allowing piped commands to be executed.
Deleting VIEW_PAGE.HTML is an adequate workaround for this
problem.
Discovered by Alexander Lazic as part of the OpenHack.com Hacking
Challenge, and discussed in an article written July 10, 2000 for ZDNet
News.
Story:
http://www.zdnet.com/zdnn/stories/news/0,4586,2600258,00.html
Bugtraq ID:
http://www.securityfocus.com/bid/1449
Cheers,
-al
Alfred Huger
VP of Engineering
SecurityFocus.com