This script is Copyright (C) 2000-2011 Tenable Network Security, Inc.
The remote web server hosts a CGI script that allows execution of
The version of the KW whois CGI script installed on the remote web
server fails to filter input to the 'whois' parameter of shell
metacharacters. An unauthenticated, remote attacker can leverage this
issue to execute arbitrary commands with the privileges of the http
See also :
Unknown at this time.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 7.1
Public Exploit Available : true
Family: CGI abuses
Nessus Plugin ID: 10541 (kw_whois.nasl)
Bugtraq ID: 1883
CVE ID: CVE-2000-0941
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.