CGI_lite.pm Insecure Input Handling Vulnerability
BID:2263
Info
CGI_lite.pm Insecure Input Handling Vulnerability
| Bugtraq ID: | 2263 |
| Class: | Design Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Aug 13 1997 12:00AM |
| Updated: | Aug 13 1997 12:00AM |
| Credit: | This vulnerability was announced by Andrew McNaughton <[email protected]> on August 13, 1997 via Bugtraq. |
| Vulnerable: |
Shishir Gundavaram CGI_lite.pm 1.62 Shishir Gundavaram CGI_lite.pm 1.8 Shishir Gundavaram CGI_lite.pm 1.7 |
| Not Vulnerable: | |
Discussion
CGI_lite.pm Insecure Input Handling Vulnerability
It is possible for users to access sensitive files remotely due to a problem in the CGI_lite.pm module. The CGI_lite.pm module allows users to upload files to a remote system. However, due to inadequate checking of the input of filenames by the module, it is possible to either view the contents of a file, or arbitrarily execute a command on a host using the module. The $filename variable within the modules does not adequately escape the inputted data when creating a file. Therefore, when a command is entered through a form POST method, it is piped directly to a shell. Therefore, a user with malicious intentions could use this to either view the contents of files readable by the UID of the httpd process, or execute commands with the inherited UID and GID of the httpd process.
It is possible for users to access sensitive files remotely due to a problem in the CGI_lite.pm module. The CGI_lite.pm module allows users to upload files to a remote system. However, due to inadequate checking of the input of filenames by the module, it is possible to either view the contents of a file, or arbitrarily execute a command on a host using the module. The $filename variable within the modules does not adequately escape the inputted data when creating a file. Therefore, when a command is entered through a form POST method, it is piped directly to a shell. Therefore, a user with malicious intentions could use this to either view the contents of files readable by the UID of the httpd process, or execute commands with the inherited UID and GID of the httpd process.