Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-1999-1053 PoC — Matt Wright GuestBook远程执行任意命令漏洞

Source
Associated Vulnerability
Title:Matt Wright GuestBook远程执行任意命令漏洞 (CVE-1999-1053)
Description:GuestBook是一个由Matt Wright编写的基于Web的CGI留言本程序,使用比较广泛。 GuestBook实现上存在输入验证漏洞,远程攻击者可能利用此漏洞以Web进程的权限在主机上执行任意系统命令。 问题在于某些版本的guestbook.pl脚本允许用户输入SSI指令而未对用户输入进行仔细的过滤,这将允许攻击者以httpd进程的权限在主机上执行任意命令。
Description
CVE-1999-1053 Proof-of-Concept Exploit
Readme
# CVE-1999-1053 Proof-of-Concept Exploit

## Background

This Proof-of-Concept(PoC) exploit is inspired from a CTF web challenge called `CVE 1999` in HKCERT CTF 2022. (Writeup [link](https://siunam321.github.io/ctf/HKCERT-CTF-2022/Web/CVE-1999/))

## Information

**Description:** In Matt Wright Guestbook <= 2.3.1, there is a Server-Side Include injection vulnerability that allows unauthenticated user to execute arbitrary code.
**Original author:** Patrick
**Original Exploit-DB link:** https://www.exploit-db.com/exploits/9907

## Proof-of-Concept Exploit

### Description

> The Matt Wright `guestbook.pl` <= v2.3.1 CGI script contains a flaw that may allow arbitrary command execution. The vulnerability requires that HTML posting is enabled in the `guestbook.pl` script, and that the web server must have the Server-Side Include (SSI) script handler enabled for the '`.html`' file type. By combining the script weakness with non-default server configuration, it is possible to exploit this vulnerability successfully. (From [Exploit-DB](https://www.exploit-db.com/exploits/9907))

### Installation

```bash
wget https://raw.githubusercontent.com/siunam321/CVE-1999-1053-PoC/main/CVE-1999-1053-PoC.py
```

### Usage/Exploitation

- `-u` or `--url` to supply the target full URL
- `-p` or `--payload` to supply the payload

### Screenshot

![](https://github.com/siunam321/CVE-1999-1053-PoC/blob/main/images/poc1.png)

![](https://github.com/siunam321/CVE-1999-1053-PoC/blob/main/images/poc2.png)

![](https://github.com/siunam321/CVE-1999-1053-PoC/blob/main/images/poc3.png)
File Snapshot

[4.0K] /data/pocs/d96db0472a12b935f040be6c0cd6bb09ebcea5cf ├── [2.7K] CVE-1999-1053-PoC.py ├── [4.0K] images │   ├── [ 38K] poc1.png │   ├── [ 47K] poc2.png │   └── [ 50K] poc3.png └── [1.5K] README.md 1 directory, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.