Name: Environment and Setup Variables can be Viewed through processit.pl CGI script Author: UkR-XblP /UkR security team:www.ukrteam.ru /GiN group:www.secure.f2s.com Problems:The script allows several environment variables to be viewed by the attacker, who can gain useful information on the site, making further attacks more feasible Analysis:processit.pl dumps useful information (e.g. script location, SERVER_SOFTWARE, DOCUMENT_ROOT, etc.) to the browser when the requested file provided is incorrect or when request without parametrs. Exploits: If site does not contain a incorrect file, thus the following URL displays the environment dump. However, a similar url, when applied within the necessary modifications to an unprotected site would yield the desired result: http://www.victim.org/cgi-bin/processit.pl?FORMNAME=UkR or http://www.victim.org/cgi-bin/processit.pl
This archive was generated by hypermail 2b30 : Mon Apr 16 2001 - 01:23:22 PDT