OS Command Injection

critical Nessus Plugin ID 121036

Synopsis

It is possible to execute OS commands on the web application by injections specially crafted input.

Description

The remote web application does not properly sanitize user input, allowing aribtrary OS commands to be executed on the server though specially crafted input.

Solution

User controlled input should not be used to construct an OS command. If this functionality is required, proper sanitization must be used to ensure all special shell characters have been removed.

Plugin Details

Severity: Critical

ID: 121036

File Name: command_injection.nbin

Version: 1.54

Type: remote

Family: CGI abuses

Published: 1/9/2019

Updated: 3/19/2024

Supported Sensors: Nessus

Risk Information

CVSS Score Rationale: Remote code execution score

CVSS v2

Risk Factor: High

Base Score: 9.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:N

CVSS Score Source: manual

CVSS v3

Risk Factor: Critical

Base Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Vulnerability Information

Required KB Items: Settings/enable_web_app_tests