CVE漏洞中文网

0DayBank一个专门收集整理全球互联网漏洞的公开发布网站
  1. 首页
  2. CVE
  3. 正文

Apache CGI Source Code Viewing Vulnerability

2016年9月26日 997点热度 0人点赞 0条评论

漏洞类别:Web server漏洞等级:

漏洞信息

If the Apache configuration file (/etc/httpd/httpd.conf) contains the following Alias entry, then all files in /cgi-bin/ can be accessed via URLs of the format http://target/cgi-bin-sdb:

Alias /cgi-bin-sdb/ /usr/local/httpd/cgi-bin/

Because the path does not contain the string /cgi-bin/, improper permissions are assigned, and the file is sent to the client instead of being executed on the server. Basically, the existence of the cgi-bin-sdb alias makes it possible for malicious users to view the source code of CGI scripts stored in /cgi-bin/.

SuSE Linux Versions 6.3 and 6.4 (prior versions may also be vulnerable) install Apache Web server (Version 1.3.12 in Version 6.4 of SuSE) with this kind of configuration file.

漏洞危害

If successfully exploited, malicious users can view the source code of CGI scripts stored in /cgi-bin/.

解决方案

You can comment out the offending entry in the Apache configuration file (/etc/httpd/httpd.conf) with a pound sign (#). See below:

#Alias /cgi-bin-sdb/ /usr/local/httpd/cgi-bin/

Alternatively, you can change this line so that CGI scripts can be executed, but not read. To do so, change the line to the following, and then stop and restart the server.

ScriptAlias /cgi-bin-sdb/ /usr/local/httpd/cgi-bin/

Updates are available for SuSE Linux. Contact your vendor for upgrade or patch information.

0day

标签: 暂无
最后更新:2016年10月22日

小助手

这个人很懒,什么都没留下

点赞
< 上一篇
下一篇 >

文章评论

您需要 登录 之后才可以评论

COPYRIGHT © 2024 www.pdr.cn CVE漏洞中文网. ALL RIGHTS RESERVED.

鲁ICP备2022031030号

联系邮箱:wpbgssyubnmsxxxkkk@proton.me