module

Matt Wright guestbook.pl Arbitrary Command Execution

Disclosed
1999-11-05
Created
2018-05-30

Description

The Matt Wright guestbook.pl a flaw that may allow arbitrary command execution. The vulnerability
requires that HTML posting is enabled in the guestbook.pl script, and
that the web server must have the Server-Side Include (SSI) script
handler enabled for the '.html' file type. By combining the script
weakness with non-default server configuration, it is possible to exploit
this vulnerability successfully.

Author

aushack patrick@osisecurity.com.au

Platform

Linux,Unix,Windows

Architectures

cmd

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/unix/webapp/guestbook_ssi_exec
msf exploit(guestbook_ssi_exec) > show targets
...targets...
msf exploit(guestbook_ssi_exec) > set TARGET < target-id >
msf exploit(guestbook_ssi_exec) > show options
...show and set options...
msf exploit(guestbook_ssi_exec) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.