Mobile app version of vmapp.org
Login or Join
Megan663

: An apache injection attack? I encountered a novel (to me anyway) form of injection attack in one of my logs login as <!--#exec cmd="ls .."--> Which looks like someone it trying to trigger

@Megan663

Posted in: #Apache #ServerSideScripting

I encountered a novel (to me anyway) form of injection attack in one of my
logs

login as <!--#exec cmd="ls .."-->


Which looks like someone it trying to trigger sever side includes on
an apache server, if the input text was echoed into an error message.

Can apache even be configured to process SSI on it's output stream?
Or is there some more subtle vulnerability it's trying to exploit?

10.01% popularity Vote Up Vote Down


Login to follow query

More posts by @Megan663

1 Comments

Sorted by latest first Latest Oldest Best

 

@Eichhorn148

This article shows how to do black box probing to test for SSI Injection exploits using text very similar to what you describe.

An exploit would certainly be possible in the case that the text is written to a file and subsequently served by the webserver that supports SSI (whether or not that site otherwise uses SSI at all). I am not aware of a way that Apache can process SSI in the output stream.

10% popularity Vote Up Vote Down


Back to top | Use Dark Theme