Guestbook CGI Remote Command Execution Vulnerability

When Guestbook is configured to allow HTML posts and you have enabled server-side includes for HTML, it may be possible for an attacker to embed SSI (server-side include) code in guestbook messages. The server-side includes allow for remote command execution, including displaying of any files to which the web server has read access (see the example):


<!--#exec cmd="cat /etc/group"

In an attempt to stop this from happening, guestbook.pl parses for SSI commands under the assumption that they are in this format:

<-- SSI command -->
^^ Does not need to be there.

Apache will accept different formats, which can evade the regular expression in guestbook.pl, executing commands on the target host as they would [if they were put there by the author].


 

Privacy Statement
Copyright 2010, SecurityFocus