Subject: pkg/11165: Global-3.55 has a security hole that allows world-wide executable cgi.
To: None <gnats-bugs@gnats.netbsd.org>
From: None <shigio@tamacom.com>
List: netbsd-bugs
Date: 10/08/2000 06:11:11
>Number: 11165
>Category: pkg
>Synopsis: Global-3.55 has a security hole that allows world-wide executable cgi.
>Confidential: no
>Severity: serious
>Priority: high
>Responsible: pkg-manager
>State: open
>Class: sw-bug
>Submitter-Id: net
>Arrival-Date: Sun Oct 08 06:11:00 PDT 2000
>Closed-Date:
>Last-Modified:
>Originator: Shigio Yamaguchi
>Release: N/A
>Organization:
Tama Communications Corporation
>Environment:
All environment.
>Description:
Almost commands are world-executable by form if you publish
the hypertext generated by htags with the -f option.
>How-To-Repeat:
Please input following six charactor in the search form and
push [Search] bottom (Please input '"' as a charactor)
";ls;"
It will show the result of ls command. If you input ";cat /etc/passwd;"
then it will show the contents of /etc/passwd.
>Fix:
Replace global-3.55 with global-3.56 or 4.0.1 and regenerate hypertext.
http://www.tamacom.com/global/global-3.56.tar.gz
http://www.tamacom.com/global/global-4.0.1.tar.gz
If you hope to shut just the security hole urgently then please
modify file 'HTML/cgi-bin/global.cgi' in the generated hyper text
with your editor.
about 35 line:
$pattern =~ s/'//g; # to shut security hole
|
v
$pattern =~ s/"//g; # to shut security hole
>Release-Note:
>Audit-Trail:
>Unformatted: