exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

metasearch

metasearch
Posted Nov 22, 1999
Authored by slackee

CGI vulnerability found in meta.pl that allows a remote user.to view files on the system as the UID of the httpd server.

tags | exploit, remote, cgi
SHA-256 | b7f7521aa7e1a5c8863f05860d8a9ccf5f935deae7fdd07e63ddbf8b161b997c

metasearch

Change Mirror Download
Vulnerable Program: Meta Tag Generator (meta.pl)
Platform : UNIX
Company : www.cgi-access.com
Impact : Remote users can view arbitary files with httpd
privilidges
Found by : slackette (warminx@null.rewted.org)
Date : 14th November

Meta Tag Generator
__________________

As quoted from their site, "You can now offer your visitors a Meta Tag
Generator which will enable them to have their site's link ranked higher in search engine
results."

www.CGI-access.com's Meta Tag Generator, basically takes in user input for
a description or
keywords pertaining to a user's site. It then creates specialised tags for
this process,
before eventually the user submits their site to various search engines.


Vulnerability
_____________

Meta Tag Generator uses a hard coded physical path for its output.txt.
By editing the hidden variable on the html form, a user can view any file
on the system,
having the priviledges as the UID of the httpd server.

The following variable within the HTML source shows this hard coded path
to the output.txt
in it's VALUE tag.

<INPUT TYPE=HIDDEN NAME=TextFile
VALUE="/home/cgi-access/html/meta/output.txt">

Thus modifying this VALUE will cause the meta.pl form to output the
alternate file that is
defined by the user. Of course this will allow a remote user to view files
such as
/etc/passwd, if allowed read access to the file.

Solution
____________

Simplest solution is to use environment variables for the output.txt in
the meta.pl itself
so it does not display direct hardcoded links.

-= warminx@null.rewted.org =-
Login or Register to add favorites

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    14 Files
  • 15
    Oct 15th
    49 Files
  • 16
    Oct 16th
    28 Files
  • 17
    Oct 17th
    23 Files
  • 18
    Oct 18th
    10 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    5 Files
  • 22
    Oct 22nd
    12 Files
  • 23
    Oct 23rd
    23 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close