AnyForm CGI Arbitrary Command Execution

high Nessus Plugin ID 10277

Synopsis

The remote web server contains a CGI script that is affected a remote command execution vulnerability.

Description

The CGI 'AnyForm2' is installed on the remote web server. Old versions of this CGI have a well known security flaw that lets anyone execute arbitrary commands with the privileges of the http daemon (root or nobody).

Solution

There is no known solution at this time.

See Also

https://seclists.org/bugtraq/1995/Aug/0

Plugin Details

Severity: High

ID: 10277

File Name: AnyForm.nasl

Version: 1.23

Type: remote

Family: CGI abuses

Published: 8/26/2002

Updated: 1/19/2021

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.1

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Required KB Items: Settings/ParanoidReport

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 7/31/1995

Reference Information

CVE: CVE-1999-0066

BID: 719