You are viewing a plain text version of this content. The canonical link for it is here.
Posted to apache-bugdb@apache.org by Paul Hurley <ra...@rat.org> on 1997/12/19 19:47:47 UTC

mod_include/1576: exec cmd bypasses ExecCGI security check. Any user can exec random programs and we can't block it!

>Number:         1576
>Category:       mod_include
>Synopsis:       exec cmd bypasses ExecCGI security check. Any user can exec random programs and we can't block it!
>Confidential:   no
>Severity:       critical
>Priority:       medium
>Responsible:    apache
>State:          open
>Class:          sw-bug
>Submitter-Id:   apache
>Arrival-Date:   Fri Dec 19 10:50:00 PST 1997
>Last-Modified:
>Originator:     rat2@rat.org
>Organization:
apache
>Release:        1.2.4
>Environment:
not really relevent to this, but here it is anyway
BSD/OS copper.mv.net 2.1 BSDI BSD/OS 2.1 Kernel #2: Sun Mar  9 12:49:56 EST 1997     root@copper.mv.
net:/usr/src/sys/compile/COPPER  i386
>Description:
<!--#exec cmd="./test.cgi"-->

should NOT work. we have ExecCGI disabled. But we want users to be able
to still run #exec cgi and #exec cmd provided they are running things in our
cgi-bin area.
>How-To-Repeat:

>Fix:
have #exec cmd not allow things to be executed in directories that have
ExecCGI turned off.
%0
>Audit-Trail:
>Unformatted:
[In order for any reply to be added to the PR database, ]
[you need to include <ap...@Apache.Org> in the Cc line ]
[and leave the subject line UNCHANGED.  This is not done]
[automatically because of the potential for mail loops. ]