CGI script environment variable
A test CGI script on the server leaks a list of server environment variables in the response page.
Security Misconfiguration (SM)
How this template works
The template uses API selection filters to specify the criteria for selecting the API endpoint to test. In this case, it filters based on the response code, ensuring it is between 200 and 299, and also extracts the URL from the response to be used in the subsequent request.
The template defines a single request to be executed. It modifies the URL by appending "/cgi-bin/printenv.pl" to the extracted URL variable. This request is sent to the server to test the vulnerability and check if it leaks any sensitive environment variables.
The template specifies the validation criteria for the response. It checks that the response code is equal to 200 and that the response payload contains any of the specified environment variables, such as 'MYSQL_HOME', 'OPENSSL_CONF', 'REMOTE_ADDR', 'SERVER_ADMIN', or 'Environment Variables'. If the validation criteria are met, it indicates that the vulnerability exists and the server is leaking sensitive information.
Frequently asked questions
What is the purpose of the CGI_PRINTENV test
How does the CGI_PRINTENV vulnerability impact the security of the system
What category does the CGI_PRINTENV vulnerability fall under
What are some examples of sensitive information that can be leaked through the CGI_PRINTENV vulnerability
How can the CGI_PRINTENV vulnerability be exploited by attackers
What are the potential consequences of not addressing the CGI_PRINTENV vulnerability promptly