rone: (Default)
[personal profile] rone

[2006/10/21 17:09:11] {co-worker} says: http://www.visiblepath.com/cgi-bin/env.pl

the script outputs the entirety of the environment variables passed to it

[2006/10/21 17:09:16] [livejournal.com profile] ronebofh says: ... wtf
[2006/10/21 17:09:35] ronebofh says: abort! abort!

Date: 2006-10-23 04:20 pm (UTC)
From: [identity profile] marknau.livejournal.com
Why were you sorting your music by time?

Freak.

Date: 2006-10-23 06:07 pm (UTC)
ext_8707: Taken in front of Carnegie Hall (monterey)
From: [identity profile] ronebofh.livejournal.com
Hahaha, i was waiting to see who'd mention that first.

As to why, it adds an element of randomness to my already shuffled playlist.

Date: 2006-10-23 09:13 pm (UTC)
From: [identity profile] paracelsvs.livejournal.com
I DONUT GEDDIT

Date: 2006-10-23 09:26 pm (UTC)
thedarkages: (gunnar-head)
From: [personal profile] thedarkages
As far as I remember it, env.pl is a standard sample script dating back to the old httpd server that could be placed in the cgi-bin directory for testing purposes. By calling it, someone can find out many interesting things about the way your server is set up, things about which you would prefer to leave the public in ignorance. That it's still there in a public site's cgi-bin directory is a big mistake.

Date: 2006-10-23 09:30 pm (UTC)
From: [identity profile] paracelsvs.livejournal.com
I dunno, on the scale of security concerns, that seems to rank somewhere between "obsessive-compulsive" and "pointless paranoia". So I still DONUT GEDDIT.

Date: 2006-10-23 09:34 pm (UTC)
ext_8707: Taken in front of Carnegie Hall (bofh)
From: [identity profile] ronebofh.livejournal.com
It's information that has no business being public. And network security should definitely have a fair amount of obsessive-compulsiveness and paranoia.

Date: 2006-10-23 09:44 pm (UTC)
From: [identity profile] paracelsvs.livejournal.com
Maybe, but the only information I see in there that isn't already publically available are a couple of internal paths, and maybe the server IP, depending on whether that is publically visible already or not. If an attacker gets to the point where he has any use for knowing the internal paths, you're most likely screwed either way. I really don't see the big deal. I mean, the server is already running PHP. It's not exactly a tight ship.

Date: 2006-10-23 09:46 pm (UTC)
From: [identity profile] paracelsvs.livejournal.com
Oh, that was actually on another server. But still.

Date: 2006-10-23 09:46 pm (UTC)
ext_8707: Taken in front of Carnegie Hall (anime - (c) 2002 jim vandewalker)
From: [identity profile] ronebofh.livejournal.com
Sure, but it's still information that has no business being public.

Date: 2006-10-23 09:48 pm (UTC)
From: [identity profile] paracelsvs.livejournal.com
I guess I was just expecting more of a punch-line.

Date: 2006-10-23 09:52 pm (UTC)
ext_8707: Taken in front of Carnegie Hall (solar eclipse)
From: [identity profile] ronebofh.livejournal.com
"I guess you had to be there." OH ZING!

Profile

rone: (Default)
entombed in the shrine of zeroes and ones

December 2022

S M T W T F S
    123
45678910
11121314151617
18192021222324
252627282930 31

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated Jul. 4th, 2025 05:14 pm
Powered by Dreamwidth Studios