in reply to Re: •Re: Shell Simulation via CGI
in thread Shell Simulation via CGI

Of course, its still a massive security hole, and I wouldn't be surprised if most hosts deny it in their service agreements.
I'd be surprised if you could distinguish this tool from another CGI script in any legally binding way.

There's no escalation of privilege for me as the CGI uploader, because I can already write scripts that do what I need, albeit not interactively.

If you're referring to the insecurity of an unsecured CGI script, that insecurity already exists in many scripts, such as the early Matt Wright attempts.

So, I don't get this "massive security hole" you speak of.

-- Randal L. Schwartz, Perl hacker
Be sure to read my standard disclaimer if this is a reply.

  • Comment on •Re: Re: •Re: Shell Simulation via CGI

Replies are listed 'Best First'.
Re: •Re: Re: •Re: Shell Simulation via CGI
by jryan (Vicar) on Feb 05, 2003 at 01:40 UTC

    With most secrity-flawed CGI scripts, a cracker might suspect a way to execute arbitrary shell commands, but won't know for sure until he successfully does one. However, with CGI-Shell, it is obvious that it is executing shell commands, which gives a cracker much more knowledge for an attack.

      .htaccess?

      Makeshifts last the longest.

        Doesn't this still involve having shell access to the account to begin with?