Observer <= 0.3.2.1 Multiple Remote Command Execution Vulnerabilities

high Nessus Plugin ID 34292

Synopsis

The remote web server contains a PHP application that allows arbitrary command execution.

Description

The remote host is running Observer, a web-based network management system written in PHP.

The version of Observer installed on the remote host fails to sanitize input to the 'query' parameter of the 'whois.php' and 'netcmd.php' scripts before using it in a commandline that is passed to the shell. Regardless of PHP's 'register_globals' setting is disabled, an unauthenticated attacker can leverage these issues to execute arbitrary code on the remote host subject to the privileges of the web server user id.

Solution

Unknown at this time.

Plugin Details

Severity: High

ID: 34292

File Name: observer_cmd_exec.nasl

Version: 1.12

Type: remote

Family: CGI abuses

Published: 9/25/2008

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 7.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Required KB Items: www/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Reference Information

BID: 31381