|
ePerl Handling of ISINDEX Query Vulnerability
1) Place perl code on filesystem. This could be done via a writeable directory on anonymous ftp. 2) Determine (or guess) the path to the code to be executed. 3) Run code via an appropriate cgi-bin program: http://foo.com/some/dir/doit.phtml?/home/ftp/incoming/executemycode.phtml |
|
Privacy Statement |