Korean
<< Back
VID 21092
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The 'view_source' CGI is installed.
The view_source CGI script distributed with some web servers and the SCO Skunkware CD-ROM. Unhopefully, 'view-source' cgi does not properly check the arguments and lets an attacker read arbitrary files with the privileges of the http daemon (usually root or nobody).

It is therefore possible to display any file on systems where view_source is world executable by sending something like:

'http://www.target.com/cgi-bin/view_source?../../../../../../../etc/passwd'

* References:
http://www.netspace.org/cgi-bin/wa?A2=ind9702B&L=bugtraq&P=R64
Recommendation Remove the "view_source" CGI from /cgi-bin directory.
Related URL CVE-1999-0174 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)