Return-Path: Delivered-To: apache-bugdb-archive@hyperreal.org Received: (qmail 4688 invoked by uid 6000); 29 Dec 1997 12:40:02 -0000 Received: (qmail 4676 invoked by uid 2001); 29 Dec 1997 12:40:00 -0000 Received: (qmail 4431 invoked by uid 2012); 29 Dec 1997 12:35:34 -0000 Message-Id: <19971229123534.4430.qmail@hyperreal.org> Date: 29 Dec 1997 12:35:34 -0000 From: Jamie Chamoulos Reply-To: jamie@efn.org To: apbugs@hyperreal.org X-Send-Pr-Version: 3.2 Subject: general/1605: possible password crack? Sender: apache-bugdb-owner@apache.org Precedence: bulk >Number: 1605 >Category: general >Synopsis: possible password crack? >Confidential: no >Severity: non-critical >Priority: medium >Responsible: apache >State: open >Class: sw-bug >Submitter-Id: apache >Arrival-Date: Mon Dec 29 04:40:00 PST 1997 >Last-Modified: >Originator: jamie@efn.org >Organization: apache >Release: 1.2.4 >Environment: linux 2.0.32 (upgraded from 2.0.27), apache 1.2.4 i486 >Description: Someone tried this: "GET /cgi-bin/phf?Qalias=x%0a/bin/cat%20/etc/passwd" 302 - I got this from the access_log, the error_log shows it failed (client denied by server configuration) so... is this a security problem? when i did the same thing (from a workstation on the same network, i got jetted to a cgi script on phf.apache.org.... saying im on candid camera~! ???? >How-To-Repeat: http://jamieweb.dyn.ml.org/cgi-bin/phf?Qalias=x%0a/bin/cat%20/etc/passwd >Fix: dont even know if its something that needs fixing%2 >Audit-Trail: >Unformatted: [In order for any reply to be added to the PR database, ] [you need to include in the Cc line ] [and leave the subject line UNCHANGED. This is not done] [automatically because of the potential for mail loops. ]