Exploits: CGI / Webserver

goahead_xpl.txt goahead webserver is by default vulnerable to a couple remote exploits.

formail_xpl.txt /cgi-bin/formmail.pl has a hidden form filed that you can use to execute arbitrary commands as the uid of the webserver.

aolserver.txt AOLServer is vulnerable to a directory traversal exploit.

guestbx.txt guestbook by guestserver (/cgi-bin/guestbook/guestbook.cgi) is vulnerable to an input validation attack - xploit by enz00 of sin.

php-cgi-xpl.txt /cgi-bin/php.cgi is vulnerable to a simple input validation hole.

phcx.c certain php scripts are inherantly vulnerable - here's two .c scripts to exploit php.

w3-msql_xpl.txt the mini-sql web frontend (/cgi-bin/w3-msql) is vulnerable to a buffer overflow. This exploit will shoot an xterm back to you.

zeus_xpl.txt the Zeus webserver has multiple vulnerabilities, as does the Zeus administration web interface (port 9090).

sunjavaweb_xpl.txt sun’s java webserver has an administrative webpage that can be accessed by any remote user with this exploit.

countcgi_xpl.c /cgi-bin/count.cgi, a web counter shipped with apache, is vulnerable to a buffer overflow.

apachephf.txt the world renowned phf vulnerability (/cgi-bin/phf).

apachefinger.txt this web finger interface (/cgi-bin/finger)has two potential security holes.

TCU's Xpl0it section: for serious hackers only. I'll be adding exploits as often as I can.


Are you new to exploits? Read this gtmhh on sploits, or DV3 to learn more.

Back

News