On Sun, 23 Jun 2002, Filipe Jorge Marques de Almeida wrote: > Don't forget this is not a serious vulnerability in many configurations > (if the user already has permission to run cgi scripts without suexec, > SSI, etc). Not exactly. You are having access to the httpd child process, not a spawned CGI script. This means that you control some interesting goods, such as file descriptors, or... oh well, the child process itself. Think about serving spoofed contents to all requests? Besides, suexec is pretty popular nowadays. -- _____________________________________________________ Michal Zalewski [lcamtufat_private] [security] [http://lcamtuf.coredump.cx] <=-=> bash$ :(){ :|:&};: =-=> Did you know that clones never use mirrors? <=-= http://lcamtuf.coredump.cx/photo/
This archive was generated by hypermail 2b30 : Sun Jun 23 2002 - 09:08:51 PDT