Apache on Windows < 1.3.24 / 2.0.x < 2.0.34 DOS Batch File Arbitrary Command Execution

high Nessus Plugin ID 10938

Synopsis

The remote web server is affected by a remote command execution vulnerability.

Description

Apache for Win32 prior to 1.3.24 and 2.0.x prior to 2.0.34-beta is shipped with a default script, '/cgi-bin/test-cgi.bat', that allows an attacker to remotely execute arbitrary commands on the host subject to the permissions of the affected application.

An attacker can send a pipe character '|' with commands appended as parameters, which are then executed by Apache.

Solution

Upgrade to Apache web server 1.3.24 or later.

See Also

https://seclists.org/bugtraq/2002/Mar/334

http://www.apacheweek.com/issues/02-03-29#apache1324

Plugin Details

Severity: High

ID: 10938

File Name: apache_bat_exec.nasl

Version: 1.36

Type: remote

Family: Web Servers

Published: 4/18/2002

Updated: 6/12/2020

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: High

Base Score: 7.3

Temporal Score: 6.6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:apache:http_server

Required KB Items: installed_sw/Apache

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Vulnerability Publication Date: 3/21/2002

Reference Information

CVE: CVE-2002-0061

BID: 4335