Forum Moderators: DixonJones

Message Too Old, No Replies

What are formmail."cgiemail" and "plemail"?

Both are new ones to me.

         

pendanticist

8:39 am on Mar 1, 2003 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member



66.65.33.122 - - [28/Feb/2003:23:39:21 -0800] "GET /cgi-bin/formmail.cgiemail=mma47@nou61.com&realname=mma47@nou61.com&recipient={{start%20chunk}}<NetJump2020@aol.com>www.blah.com,{{end%20chunk}}&subject={{subject}}&43hq76=%0D%0A%0D%0A{{body}}{{rndreturns}}43hq76%20~vms HTTP/1.0" 404 438 "-" "-"
66.65.33.122 - - [28/Feb/2003:23:39:21 -0800] "GET /cgi-bin/formmail.plemail=tjs71@fzt77.com&realname=tjs71@fzt77.com&recipient={{start%20chunk}}<NetJump2020@aol.com>www.blah.com,{{end%20chunk}}&subject={{subject}}&29vi79=%0D%0A%0D%0A{{body}}{{rndreturns}}29vi79%20~vms HTTP/1.0" 200 816 "-" "-"

This has got to be one of the strangest I've seen yet.

Also, any ideas what all the {}{}{}{}'s are about?

Is someone trying to yank my chain, or is this something all together new?

Pendanticist.

hakre

8:50 am on Mar 1, 2003 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member



hi pendanticist,

this looks like somebody is testing wether these scripts exists on your webserver and then testing for errors in these scripts to attack your webserver.

frommail is well known to have bugs that you can gain access to a webserver easyly.

-hakre

pendanticist

9:23 am on Mar 1, 2003 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member



this looks like somebody is testing wether these scripts exists on your webserver and then testing for errors in these scripts to attack your webserver.

frommail is well known to have bugs that you can gain access to a webserver easyly.

I have no CGI-Bins [webmasterworld.com] hakre. In fact, I just closed two Open Proxy Servers [webmasterworld.com] in two days reporting formmail queries somewhat similar to the above.

What I don't understand is the methodology/encoding in this particular case. Normally, the addies are at least real looking and mostly aol and mail.com are used within the query itself.

  • "nou61.com" and "fzt77.com" <- surely they can't be valid.

  • ={{start%20chunk}}

  • ,{{end%20chunk}}&subject={{subject}}&29vi79=%0D%0A%0D%0A{{body}}{{rndreturns}}29vi79%20~vms

    See what I'm referring to? These three nuances are new to me.. Never seen them before, in this way.

    Pendanticist.

  • hakre

    9:58 am on Mar 1, 2003 (gmt 0)

    WebmasterWorld Senior Member 10+ Year Member



    pendanticist, i think these nuances are part of the exploit.