jspwebshell Backdoor Detection

high Nessus Plugin ID 87501

Synopsis

The remote web server contains a PHP backdoor script.

Description

At least one instance of jspwebshell is hosted on the remote web server. This is a JSP script that acts as a backdoor and provides a convenient set of tools for attacking the affected host.

Solution

Remove any instances of the jspwebshell backdoor script and conduct a forensic examination to determine how it was installed as well as whether other unauthorized changes were made.

Plugin Details

Severity: High

ID: 87501

File Name: jspwebshell.nasl

Version: 1.6

Type: remote

Family: CGI abuses

Published: 12/18/2015

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Required KB Items: www/JSP

Excluded KB Items: Settings/disable_cgi_scanning