CVE漏洞中文网

0DayBank一个专门收集整理全球互联网漏洞的公开发布网站
  1. 首页
  2. CVE
  3. 正文

phf CGI Vulnerability

2016年9月26日 1274点热度 0人点赞 0条评论

漏洞类别:CGI漏洞等级:

漏洞信息

A vulnerability exists in the sample cgi-bin program, phf, which is included with NCSA HTTPd, and Apache Version 1.0.3, an NCSA derivitive. By supplying certain characters that have special meaning to the shell, arbitrary commands can be executed by remote users under whatever user the HTTPd is running as.

The phf program, and possibly other programs, call the escape_shell_cmd() function. This subroutine is intended to strip out dangerous characters prior to passing these strings along to shell-based library calls, such as popen() or system(). By failing to capture certain characters, however, it becomes possible to execute commands from these calls. Versions below each of the vulnerable Web servers are assumed to be vulnerable to exploitation via the phf example code.

漏洞危害

If successfully exploited, unauthorized users can execute any command and download any file from the server.

解决方案

This cgi-bin call, along with any others that are unused, should be removed. A patched version of the escape_shell_cmd() function is available as part of later HTTPd distributions. You can download the patched version fromhttp://hoohoo.ncsa.uiuc.edu.

Apache should be upgraded immediately. Newer versions of Apache Server can be downloaded from http://www.apache.org.

0day

标签: 暂无
最后更新:2016年10月22日

小助手

这个人很懒,什么都没留下

点赞
< 上一篇
下一篇 >

文章评论

您需要 登录 之后才可以评论

COPYRIGHT © 2024 www.pdr.cn CVE漏洞中文网. ALL RIGHTS RESERVED.

鲁ICP备2022031030号

联系邮箱:wpbgssyubnmsxxxkkk@proton.me