[16480] in bugtraq

home help back first fref pref prev next nref lref last post

More problems with Auction Weaver & CGI Script Center.

daemon@ATHENA.MIT.EDU (teleh0r -)
Fri Sep 1 14:54:39 2000

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id:  <382564173.967815382024.JavaMail.root@web313-mc.mail.com>
Date:         Fri, 1 Sep 2000 09:36:21 -0400
Reply-To: teleh0r - <teleh0r@DOGLOVER.COM>
From: teleh0r - <teleh0r@DOGLOVER.COM>
To: BUGTRAQ@SECURITYFOCUS.COM

There seem to be a misunderstanding about the
exploit I wrote for Auction Weaver 1.2. It appears
that quite a few believed that that was a exploit for
the problem found by Meliksah Ozoral.

My exploit has nothing to do with that problem, except
that is exploits the same script ;) The one I wrote,
exploits a unsecure open(...) in the script, which allows
a user to execute commands under the uid of the http daemon.

So, to all users of Auction Weaver 1.2, you are far from secure yet,
I just hope CGI Script Center as fixed this one as well.

I am sorry for not expressing myself clearer.

Sincerely yours,
teleh0r


______________________________________________
FREE Personalized Email at Mail.com
Sign up at http://www.mail.com/?sr=signup

home help back first fref pref prev next nref lref last post