Home / vulnerabilities corehttp.txt
Posted on 23 December 2009
Source : packetstormsecurity.org Link
Package name: CoreHTTP server
Version: 0.5.3.1 and below (as long as cgi support is enabled)
Software URL: http://corehttp.sourceforge.net/
Exploit: http://aconole.brad-x.com/programs/corehttp_cgienabled.rb
Issue: CoreHTTP server fails to properly sanitize input before calling popen()
and allows an attacker using a standard web browser to execute arbitrary
commands.
NOTE: depending on the script and directory permissions, the attacker
may not be able to view output.
Further Discussion: During code review / debugging of CoreHTTP, a look at http.c
source file revealed:
/* escape the url for " and since we use it in popen */
for (i = 0; i < PATHSIZE; i++) {
if (url[i] == '