WebGUI < 6.7.3 Multiple Command Execution Vulnerabilities

high Nessus Plugin ID 19590

Synopsis

The remote web server contains a CGI script that is prone to arbitrary code execution.

Description

The remote host is running WebGUI, a content management system from Plain Black Software.

According to its banner, the installed version of WebGUI on the remote host fails to sanitize user-supplied input to various sources before using it to run commands. By leveraging these flaws, an attacker may be able to execute arbitrary commands on the remote host within the context of the affected web server userid.

Solution

Upgrade to WebGUI 6.7.3 or later.

See Also

http://www.nessus.org/u?1763907f

Plugin Details

Severity: High

ID: 19590

File Name: webgui_673.nasl

Version: 1.19

Type: remote

Family: CGI abuses

Published: 9/6/2005

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:plain_black:webgui

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Vulnerability Publication Date: 9/1/2005

Reference Information

CVE: CVE-2005-2837

BID: 14732