Cherokee Web Server Port Bind Privilege Drop Weakness

high Nessus Plugin ID 15622

Synopsis

The remote web server is affected by a remote command execution vulnerability.

Description

The remote host is running Cherokee - a fast and tiny web server.

The remote version of this software is vulnerable to remote command execution due to a lack of web requests sanitization, especially shell metacharacters.

Additionally, this version fails to drop root privileges after it binds to listen port.

A remote attacker may submit a specially crafted web request to execute arbitrary command on the server with root privileges.

Solution

Upgrade to Cherokee 0.2.7 or newer as this reportedly fixes the issue.

See Also

http://www.nessus.org/u?b7d15999

Plugin Details

Severity: High

ID: 15622

File Name: cherokee_remote_cmd.nasl

Version: 1.17

Type: remote

Family: Web Servers

Published: 11/4/2004

Updated: 6/12/2020

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 12/30/2001

Reference Information

CVE: CVE-2001-1433

BID: 3771, 3773