Web Server /cgi-bin Shell Access

high Nessus Plugin ID 10252

Synopsis

Arbitrary commands can be run on the remote server.

Description

The remote web server has one of these shells installed in /cgi-bin :
ash, bash, csh, ksh, sh, tcsh, zsh

Leaving executable shells in the cgi-bin directory of a web server may allow an attacker to execute arbitrary commands on the target machine with the privileges of the HTTP daemon.

Solution

Remove all the shells from /cgi-bin.

Plugin Details

Severity: High

ID: 10252

File Name: shells.nasl

Version: 1.36

Type: remote

Family: CGI abuses

Published: 7/13/1999

Updated: 1/19/2021

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Required KB Items: Settings/ParanoidReport

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Vulnerability Publication Date: 1/1/1995

Reference Information

CVE: CVE-1999-0509

CWE: 94