zml.cgi Directory Traversal

medium Nessus Plugin ID 10830

Synopsis

The remote host contains a CGI script that is prone to directory traversal attacks.

Description

ZML.cgi is vulnerable to a directory traversal attack. It enables a remote attacker to view any file on the computer with the privileges of the cgi/httpd user.

Solution

Remove this CGI from the web server.

See Also

http://www.nessus.org/u?a85ffb3a

Plugin Details

Severity: Medium

ID: 10830

File Name: zml_cgi_traversal.nasl

Version: 1.30

Type: remote

Family: CGI abuses

Published: 1/17/2002

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Vulnerability Publication Date: 12/31/2001

Reference Information

CVE: CVE-2001-1209

BID: 3759