Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!


TUCoPS :: Web :: Apps :: httpd80.htm

WebWho+ (a whois cgi) shell escape characters vulnerability



Vulnerability

    WebWho+ (a whois cgi)

Affected

    Those using WenWho+ v1.1

Description

    Following is based on hhp-ADV#13.   WebWho+ v1.1 checks for  shell
    escape characters  in its  'command' parameter, but what keeps  us
    from changing the pre seleted, default TLD options.  WebWho+  v1.1
    does NOT  check for  shell espace   characters in  its 'type'(TLD)
    peremeter which is what is being exploited.

    The exploit is available to download via:

        http://hhp.perlx.com/ourexploits/hhp-webwho.pl

Solution
    Download a  secure, shell  espace character  parsing whois  common
    gateway interface from:

        http://cgi.resourceindex.com/Programs_and_Scripts/Perl/Internet_Utilities/Whois/


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH