IRIX pfdispaly Arbitrary File Access

high Nessus Plugin ID 10174

Synopsis

It may be possible to read arbitrary files from the remote system.

Description

The 'pfdispaly' CGI is installed. This CGI has a well known security flaw that lets an attacker read arbitrary files with the privileges of the http daemon (usually root or nobody).

Solution

Remove it from /cgi-bin.

Plugin Details

Severity: High

ID: 10174

File Name: pfdipaly.nasl

Version: 1.31

Type: remote

Family: CGI abuses

Published: 6/22/1999

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: High

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N

Vulnerability Information

Excluded KB Items: Settings/disable_cgi_scanning

Vulnerability Publication Date: 4/2/1998

Reference Information

CVE: CVE-1999-0270