CVE-1999-1053 Proof-of-Concept Exploit# CVE-1999-1053 Proof-of-Concept Exploit
## Background
This Proof-of-Concept(PoC) exploit is inspired from a CTF web challenge called `CVE 1999` in HKCERT CTF 2022. (Writeup [link](https://siunam321.github.io/ctf/HKCERT-CTF-2022/Web/CVE-1999/))
## Information
**Description:** In Matt Wright Guestbook <= 2.3.1, there is a Server-Side Include injection vulnerability that allows unauthenticated user to execute arbitrary code.
**Original author:** Patrick
**Original Exploit-DB link:** https://www.exploit-db.com/exploits/9907
## Proof-of-Concept Exploit
### Description
> The Matt Wright `guestbook.pl` <= v2.3.1 CGI script contains a flaw that may allow arbitrary command execution. The vulnerability requires that HTML posting is enabled in the `guestbook.pl` script, and that the web server must have the Server-Side Include (SSI) script handler enabled for the '`.html`' file type. By combining the script weakness with non-default server configuration, it is possible to exploit this vulnerability successfully. (From [Exploit-DB](https://www.exploit-db.com/exploits/9907))
### Installation
```bash
wget https://raw.githubusercontent.com/siunam321/CVE-1999-1053-PoC/main/CVE-1999-1053-PoC.py
```
### Usage/Exploitation
- `-u` or `--url` to supply the target full URL
- `-p` or `--payload` to supply the payload
### Screenshot



[4.0K] /data/pocs/d96db0472a12b935f040be6c0cd6bb09ebcea5cf
├── [2.7K] CVE-1999-1053-PoC.py
├── [4.0K] images
│ ├── [ 38K] poc1.png
│ ├── [ 47K] poc2.png
│ └── [ 50K] poc3.png
└── [1.5K] README.md
1 directory, 5 files