Vulnerability disclosure: exposed CGI script and TLS misconfiguration on tb.aixblock.io #204
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Description:
This pull request adds a security disclosure documenting a publicly accessible CGI script (printenv.pl) found on the subdomain tb.aixblock.io. The script leaks sensitive environment variables such as internal paths, server software versions, and other system details that could aid an attacker in reconnaissance or further exploitation.
Additionally, this report covers a TLS certificate misconfiguration where the certificate does not match the domain name, potentially allowing man-in-the-middle attacks.
Details:
Exposed environment variables and server details via /cgi-bin/printenv.pl
Server software identified: Apache/2.4.58, OpenSSL/3.1.3, PHP/8.0.30, XAMPP on Windows
TLS certificate missing tb.aixblock.io in SAN field, causing SSL verification failures
Recommendations include removing or restricting access to the CGI script, disabling CGI if not needed, and reissuing a valid TLS certificate.
Please review and consider this disclosure for inclusion in the security advisories or documentation.