: An apache injection attack? I encountered a novel (to me anyway) form of injection attack in one of my logs login as <!--#exec cmd="ls .."--> Which looks like someone it trying to trigger
I encountered a novel (to me anyway) form of injection attack in one of my
logs
login as <!--#exec cmd="ls .."-->
Which looks like someone it trying to trigger sever side includes on
an apache server, if the input text was echoed into an error message.
Can apache even be configured to process SSI on it's output stream?
Or is there some more subtle vulnerability it's trying to exploit?
More posts by @Megan663
1 Comments
Sorted by latest first Latest Oldest Best
This article shows how to do black box probing to test for SSI Injection exploits using text very similar to what you describe.
An exploit would certainly be possible in the case that the text is written to a file and subsequently served by the webserver that supports SSI (whether or not that site otherwise uses SSI at all). I am not aware of a way that Apache can process SSI in the output stream.
Terms of Use Create Support ticket Your support tickets Stock Market News! © vmapp.org2024 All Rights reserved.