Tarantella Enterprise ttawebtop.cgi pg Parameter Traversal Arbitrary File Access

high Nessus Plugin ID 10696

Synopsis

The remote host has a CGI installed that is affected by multiple vulnerabilities.

Description

The 'ttawebtop.cgi' CGI is installed. The installed version is affected by multiple flaws :

- It is possible to read arbitrary files from the remote system by including directory traversal strings in the request.

- It may be possible for an attacker to execute arbitrary commands with the privileges of the http daemon (usually root or nobody). Note though Nessus has not verified if command execution is possible.

Solution

remove it from /cgi-bin.

Plugin Details

Severity: High

ID: 10696

File Name: ttawebtop.nasl

Version: 1.25

Type: remote

Family: CGI abuses

Published: 6/20/2001

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N

Vulnerability Information

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Vulnerability Publication Date: 6/18/2001

Reference Information

CVE: CVE-2001-0805

BID: 2890