COMMAND
Apache::ASP
SYSTEMS AFFECTED
Apache::ASP prior to v1.95
PROBLEM
Joshua Chamas found following. Apache::ASP had a security hole in
its ./site/eg/source.asp distribution examples file, allowing a
malicious hacker to potentially write to files in the directory
local to the source.asp example script.
The next version of Apache::ASP v1.95 going to CPAN will not have
this security hole in its example ./site/eg/source.asp The
general CHANGES for this release is below.
The original report on a similar perl open() bug was at ZDNet's
eWeek where a hacking contest at openhack.com turned up a bug on
its minivend ecommerce software. For minivend, see:
http://oliver.efri.hr/~crv/security/bugs/Others/minivend.html
SOLUTION
Until you have the latest examples, it is recommended deleting
this source.asp file from any public web server that has
Apache::ASP installed on it. 1.95 fixed this.