MAILNEWS mailnews.cgi Arbitrary Command Execution

high Nessus Plugin ID 10641

Synopsis

A web application on the remote host has a command execution vulnerability.

Description

mailnews.cgi is being hosted on the remote web server. Input to the 'address' parameter is not properly sanitized. A remote attacker could exploit this to execute arbitrary commands with the privileges of the web server.

Please note Nessus only checked for the presence of this CGI, and did not attempt to exploit it, so this may be a false positive.

Solution

Remove this CGI from the web server.

See Also

https://seclists.org/bugtraq/2001/Feb/189

Plugin Details

Severity: High

ID: 10641

File Name: mailnews.nasl

Version: 1.29

Type: remote

Family: CGI abuses

Published: 3/25/2001

Updated: 1/19/2021

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Required KB Items: Settings/ParanoidReport

Exploit Available: true

Exploit Ease: No exploit is required

Vulnerability Publication Date: 2/18/2001

Reference Information

CVE: CVE-2001-0271

BID: 2391