Apache on Windows < 1.3.24 / 2.0.34 DOS Batch File Arbitrary Command Execution

This script is Copyright (C) 2002-2013 Matt Moore


Synopsis :

The remote web server is vulnerable to a remote command execution
attack.

Description :

The Apache for Win32 before 1.3.24 and 2.0.x before 2.0.34-beta is
shipped with a default script, '/cgi-bin/test-cgi.bat', that allows an
attacker to remotely execute arbitrary commands on the host subject to
the permissions of the affected application.

An attacker can send a pipe character '|' with commands appended as
parameters, which are then executed by Apache.

See also :

http://archives.neohapsis.com/archives/bugtraq/2002-03/0270.html
http://www.apacheweek.com/issues/02-03-29#apache1324

Solution :

Upgrade to Apache web server 1.3.24 or later.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 6.5
(CVSS2#E:H/RL:OF/RC:C)
Public Exploit Available : true

Family: Web Servers

Nessus Plugin ID: 10938 (apache_bat_exec.nasl)

Bugtraq ID: 4335

CVE ID: CVE-2002-0061