| [Date Prev] [Date Next] | [Thread Prev] [Thread Next] | [Date Index] [Thread Index] |
Potential webnocol.cgi Vulnerability
|
hi Vikas,
Was going through the code for webnocol.cgi and I came across this near
line 663,
if ($cmd) {
$cmd =~ s/DEVICE/$siteaddr/ ; # replace keyword with IP address
if (! open (CMD, "$cmd 2>&1 |") ) {
print "Command $cmd error <p>\n";
This portion replaces the keyword DEVICE with the $siteaddr posted by the
HTML form (lines 127) so a malicious user that knows a site is using
NOCOL, and that is unrestricted by .htaccess can cause a bit of a problem
by doing a POST with dangerous characters placed in the field 'siteaddr'.
A suggestion would be to do a
$siteaddr=~y/[a-zA-Z0-9_.\-]//cd;
prior to executing the diagnostic commands.
Comments are welcomed.
rgds,
Lim Fung
|