Cherokee Web Server Port Bind Privilege Drop Weakness

This script is Copyright (C) 2004-2016 Tenable Network Security, Inc.

Synopsis :

The remote web server is affected by a remote command execution

Description :

The remote host is running Cherokee - a fast and tiny web server.

The remote version of this software is vulnerable to remote
command execution due to a lack of web requests sanitization,
especially shell metacharacters.

Additionally, this version fails to drop root privileges after it
binds to listen port.

A remote attacker may submit a specially crafted web request to
execute arbitrary command on the server with root privileges.

See also :

Solution :

Upgrade to Cherokee 0.2.7 or newer as this reportedly fixes the issue.

Risk factor :

High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.5
Public Exploit Available : true

Family: Web Servers

Nessus Plugin ID: 15622 (cherokee_remote_cmd.nasl)

Bugtraq ID: 3771

CVE ID: CVE-2001-1433

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now