CGI script environment variable
A test CGI script on the server leaks a list of server environment variables in the response page.
Security Misconfiguration (SM)
How this template works
APIs Selection
The template uses API selection filters to specify the criteria for selecting the API endpoint to test. In this case, it filters based on the response code, ensuring it is between 200 and 299, and also extracts the URL from the response to be used in the subsequent request.
Execute request
The template defines a single request to be executed. It modifies the URL by appending "/cgi-bin/printenv.pl" to the extracted URL variable. This request is sent to the server to test the vulnerability and check if it leaks any sensitive environment variables.
Validation
The template specifies the validation criteria for the response. It checks that the response code is equal to 200 and that the response payload contains any of the specified environment variables, such as 'MYSQL_HOME', 'OPENSSL_CONF', 'REMOTE_ADDR', 'SERVER_ADMIN', or 'Environment Variables'. If the validation criteria are met, it indicates that the vulnerability exists and the server is leaking sensitive information.
Frequently asked questions
What is the purpose of the CGI_PRINTENV test
How does the CGI_PRINTENV vulnerability impact the security of the system
What category does the CGI_PRINTENV vulnerability fall under
What are some examples of sensitive information that can be leaked through the CGI_PRINTENV vulnerability
How can the CGI_PRINTENV vulnerability be exploited by attackers
What are the potential consequences of not addressing the CGI_PRINTENV vulnerability promptly
"The text editor in Akto is absolutely remarkable. Its user-friendly YAML format strikes the perfect balance between simplicity and power. With intuitive features like 'API selection filter', 'Execute', Validate' creating test rules becomes incredibly easy. Akto's test editor is a game-changer, enabling seamless creation of highly personalized and effective tests that could meet the needs of any modern day organization. "

Security team,
Rippling
Explore other tests
eSMTP - Config Discovery
Nginx - Git Configuration Exposure
Laravel - Sensitive Information Disclosure
Docker Container - Misconfiguration Exposure
Msmtp - Config Exposure
Parameters.yml - File Discovery
Mongo Express - Unauthenticated Access
Apache Airflow Configuration Exposure
Dockerrun AWS Configuration Exposure
Apache Config file disclosure
Appspec Yml Disclosure
circleci config.yml exposure