[18005] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Filename Inspection+Perl can Executing commands

daemon@ATHENA.MIT.EDU (Tom Geldner)
Sun Dec 10 21:14:59 2000

Mime-Version: 1.0
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: 7bit
Message-Id:  <017201c060db$2d536bc0$0100a8c0@bosco>
Date:         Thu, 7 Dec 2000 21:53:22 -0800
Reply-To: Tom Geldner <tom@XOR.CC>
From: Tom Geldner <tom@XOR.CC>
X-To:         Billy Nothern <disk_key@HOTMAIL.COM>
To: BUGTRAQ@SECURITYFOCUS.COM

----- Original Message -----
From: "Billy Nothern" <disk_key@HOTMAIL.COM>
Here is an example URL an attacker could use:

http://host/."./."./Perl/eg/core/findtar+&+echo+hacked+>+c:\InetPub\ww
wroot\hacked.html+&+.pl

The whole discussion was interesting but speaking as a site the runs
ActiveState Perl, the assumptive directory layout you've outlined
doesn't seem correct. (Regardless, we don't have findtar in our Perl
libs.)

lib/core is what I've seen. Is this exploit specific to a particular
install or version of AS Perl for IIS?

Tom

home help back first fref pref prev next nref lref last post