- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 20435
- Проверка EDB
- 
	
		
			- Пройдено
 
- Автор
- @STAKE
- Тип уязвимости
- REMOTE
- Платформа
- CGI
- CVE
- cve-1999-0070
- Дата публикации
- 1996-04-01
		Код:
	
	source: https://www.securityfocus.com/bid/2003/info
NCSA HTTPd and comes with a CGI sample shell script, test-cgi, located by default in /cgi-bin. This script does not properly enclose an "ECHO" command in quotes, and as a result "shell expansion" of the * character can occur under some configurations. This allows a remote attacker to obtain file listings, by passing *, /*, /usr/* etc., as variables. The ECHO command expands the * to give a directory listing of the specified directory. This could be used to gain information to facilitate future attacks. This is identical to a problem with another sample script, nph-test-cgi. See references. 
http://target/cgi-bin/test-cgi?/*
http://target/cgi-bin/test-cgi?*- Источник
- www.exploit-db.com
 
 
		