Metertek pagelog.cgi Traversal Arbitrary File Access

medium Nessus Plugin ID 10591

Synopsis

It may be possible to create arbitrary files on the remote system.

Description

The 'pagelog.cgi' cgi is installed. This CGI has a well known security flaw that lets an attacker create arbitrary files on the remote server, ending in .txt, and reading arbitrary files ending in .txt or .log

*** Warning : this flaw was not tested by Nessus. Check the existence of /tmp/nessus_pagelog_cgi.txt on this host to find out if you are vulnerable or not.

Solution

Remove it from /cgi-bin.

Plugin Details

Severity: Medium

ID: 10591

File Name: pagelog_cgi.nasl

Version: 1.29

Type: remote

Family: CGI abuses

Published: 1/8/2001

Updated: 1/19/2021

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.0

CVSS v2

Risk Factor: Medium

Base Score: 6.4

Temporal Score: 4.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Information

Required KB Items: Settings/ParanoidReport

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Vulnerability Publication Date: 10/29/2000

Reference Information

CVE: CVE-2000-0940

BID: 1864