Date: Sun, 26 Jan 1997 10:02:53 -0800 From: erich@powerwareintl.com (Eric Harley) To: Ulf Zimmermann <ulf@Alameda.net>, Christian Hochhold <expert@dusk.net>, freebsd-isp@FreeBSD.ORG Subject: Re: possible phf exploit? Message-ID: <v02130404af113a1108f1@[207.104.16.65]>
next in thread | raw e-mail | index | archive | help
You can all thank 2600 Magazine. last month they did an issue on phf and how to crack it. Interesting article, but since the problem was solved a long time ago, the article is useless. >This an old thing. I am getting serveral hits per month, trying that. > >Ulf. > >At 03:43 AM 1/26/97 -0400, Christian Hochhold wrote: >>Evenin' >> >>While checking my access logs I came across a few very interesting >>things.. someone trying to get to the passwd file through pfh. >>The logs showed the attempted access as being in the following format: >> >>/cgi-bin/phf/Q?alias=x%ff/bin/cat%20/etc/passwd >> >>I don't run phf (nor have I checked it out per say), however >>to someone who does know/use phf this might prove interesting. >> Eric Eric Harley, VP Information Systems & CIO Powerware International http://www.powerwareintl.com/ Email: eric.harley@powerwareintl.com Web: http://www.powerwareintl.com/staff/erich/ PGP: http://www.powerwareintl.com/staff/erich/pgp.txt
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?v02130404af113a1108f1>