How to Buy
This script is Copyright (C) 2002-2016 Matt Moore
The remote web server is affected by a remote command execution
Apache for Win32 prior to 1.3.24 and 2.0.x prior to 2.0.34-beta is
shipped with a default script, '/cgi-bin/test-cgi.bat', that allows an
attacker to remotely execute arbitrary commands on the host subject to
the permissions of the affected application.
An attacker can send a pipe character '|' with commands appended as
parameters, which are then executed by Apache.
See also :
Upgrade to Apache web server 1.3.24 or later.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.5
Public Exploit Available : true
Family: Web Servers
Nessus Plugin ID: 10938 (apache_bat_exec.nasl)
Bugtraq ID: 4335
CVE ID: CVE-2002-0061
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.