Exploit Matt Kruse Calendar Script 2.2 - Arbitrary Command Execution

Exploiter

Хакер
34,599
0
18 Дек 2022
EDB-ID
19921
Проверка EDB
  1. Пройдено
Автор
SUID
Тип уязвимости
REMOTE
Платформа
CGI
CVE
cve-2000-0432
Дата публикации
2000-05-16
Matt Kruse Calendar Script 2.2 - Arbitrary Command Execution
Код:
source: https://www.securityfocus.com/bid/1215/info

Matt Kruse's Calendar script is a popular, free perl cgi-script used by many websites on the Internet. It allows a website administrator to easily setup and customize a calendar on their website. There are two components of this package, calendar-admin.pl and calendar.pl. Calendar-admin.pl calls open() with user-input in the command string but does not parse the input for metacharacters. It is therefor possible to execute arbitrary commands on the target host by passing "|shell command|" as one value of the "configuration file" field. The shell that is spawned with the open() call will then execute those commands with the uid of the webserver. This can result in remote access to the system for the attacker. Calendar.pl is vulnerable to a similar attack.

calender_admin.pl - easiest.

Assuming http://www.ownable.domain/ has calender.pl at:
http://www.ownable.domain/cgi-bin/calender.pl

The admin script by default is at:
http://www.ownable.domain/cgi-bin/calender_admin.pl

Going to that URL will result in a username/password/configuration file input fields. Ignoring username and password, enter:

|<command here>|

(With the pipes) in the configuration file field.

e.g. 

|ping 127.0.0.1|
 
Источник
www.exploit-db.com

Похожие темы