-
Notifications
You must be signed in to change notification settings - Fork 126
Open
Description
Vulnerability Description
A publicly accessible CGI script (printenv.pl
) was discovered on the subdomain tb.aixblock.io
. This script discloses server-side environment variables including internal configuration paths, software stack details, and other potentially sensitive system information.
Additionally, the server’s TLS certificate is misconfigured and does not match the domain name (tb.aixblock.io
), causing SSL verification failures for HTTPS clients.
Impact Assessment
- Discloses full internal paths (e.g.,
E:/xampp/...
) and environment variables - Identifies server software:
Apache/2.4.58
,OpenSSL/3.1.3
,PHP/8.0.30
,XAMPP on Windows
- Assists attacker reconnaissance and potentially enables further exploitation (e.g., LFI, RCE, misconfigured tools)
- TLS certificate mismatch weakens trust and allows for potential MitM attacks
Evidence
Vulnerable Endpoint:
https://tb.aixblock.io/cgi-bin/printenv.pl
Sample Output (truncated):
COMSPEC="C:\Windows\system32\cmd.exe"
DOCUMENT_ROOT="E:/xampp/htdocs"
SERVER_SOFTWARE="Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30"
PATH="C:\Program Files\Python38\;..."
REMOTE_ADDR="Client IP"
...
TLS Error (using curl):
curl: (60) SSL: no alternative certificate subject name matches target hostname 'tb.aixblock.io'
Recommendations
- Remove or restrict access to
/cgi-bin/printenv.pl
- Disable CGI execution in Apache if unnecessary
- Reissue the TLS certificate to include
tb.aixblock.io
in the SAN field - Avoid hosting development configurations on publicly accessible servers
Submitted in accordance with the AIxBlock Bug Bounty Reporting Process.
Metadata
Metadata
Assignees
Labels
No labels