Penetration Testing mailing list archives

Re: Python CGI interpreter phys.path vuln on Win32 ?


From: Joerg Over <over () dexia de>
Date: Fri, 12 Oct 2001 17:30:20 +0100

Hi...

At 09:43 12.10.01 -0000 you wrote:
---8<--------------------8<--------------------8<--------------------
->When addressing a non-existent CGI script in the /cgi-
->bin folder (or other executable folders that contain 
->CGI's) the webserver reveals the physical path of 
->both the Python interpreter as well as the non-
->existent cgi-script.
->
->The output looks somewhat like:
->
-><c:\program files\python\python.exe: can't open 
->file 'c:\inetpub\wwwroot\cgi-bin\fakefile.cgi'>
---8<--------------------8<--------------------8<--------------------

Not python, it's IIS. Compare:

http://www.securiteam.com/exploits/2XUPRRFQAG.html
http://home.cyberarmy.com/kaladis/files/cgi-bugs.html

greetings, jo
+-------------------------------------------------------------------+
|  __ __ __ __ _ _          It ain't over 'till it's Joerg Over...  |
| / _ \ V / -_) '_/                                                 |
| \___/\_/\___|_|                                                   |
+-------------------------------------------------------------------+


----------------------------------------------------------------------------
This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
Service. For more information on SecurityFocus' SIA service which
automatically alerts you to the latest security vulnerabilities please see:
https://alerts.securityfocus.com/


Current thread: