PlusMail plusmail CGI Arbitrary Command Execution

medium Nessus Plugin ID 10181

Synopsis

Arbitrary files can be run on the remote host.

Description

The 'plusmail' CGI is installed. Some versions of this CGI have a well known security flaw that lets an attacker read arbitrary file with the privileges of the HTTP server.

Solution

Remove it from /cgi-bin. No patch yet

Plugin Details

Severity: Medium

ID: 10181

File Name: plusmail.nasl

Version: 1.29

Type: remote

Family: CGI abuses

Published: 1/12/2000

Updated: 1/19/2021

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

Required KB Items: Settings/ParanoidReport

Exploit Ease: No exploit is required

Vulnerability Publication Date: 1/11/2000

Reference Information

CVE: CVE-2000-0074

BID: 2653