Í
Íßêïò Ãêñ33ê
Ôç ÐáñáóêåõÞ, 8 Ìáñôßïõ 2013 10:01:59 ì.ì. UTC+2, ï ÷ñÞóôçò Ian Ýãñáøå:
Thank you very much for pointing my flaws once again!
I cant beleive how easy you hacked the webserver again and be able to read my cgi scripts source and write to cgi-bin too!
I have added extra security by following some of your advice, i wonder if youc an hack it again!
Fell free to try if i'am not tiring you please!
Okay, done. I was still able to read your source files, and I was
still able to write a file to your webserver. All I had to do was
change 'htmlpage' to 'page' in the example URLs I sent you before.
Validating the 'htmlpage' field does nothing if you also switch the
dispatch to the 'page' field.
And as far as the validation goes, from what I can see in the source,
it looks like you're just checking whether the string '.html' appears
in it somewhere. It's not hard at all to craft a malicious page
request that meets that.
As a start, try checking that the file actually exists before doing
anything with it, and that it is in one of the directories used by
your web server.
Thank you very much for pointing my flaws once again!
I cant beleive how easy you hacked the webserver again and be able to read my cgi scripts source and write to cgi-bin too!
I have added extra security by following some of your advice, i wonder if youc an hack it again!
Fell free to try if i'am not tiring you please!