Synopsis
The remote web server contains a PHP application that allows arbitrary command execution.
Description
The remote host is running Observer, a web-based network management system written in PHP.
The version of Observer installed on the remote host fails to sanitize input to the 'query' parameter of the 'whois.php' and 'netcmd.php' scripts before using it in a commandline that is passed to the shell. Regardless of PHP's 'register_globals' setting is disabled, an unauthenticated attacker can leverage these issues to execute arbitrary code on the remote host subject to the privileges of the web server user id.
Solution
Unknown at this time.
Plugin Details
File Name: observer_cmd_exec.nasl
Configuration: Enable thorough checks (optional)
Supported Sensors: Nessus
Vulnerability Information
Required KB Items: www/PHP
Excluded KB Items: Settings/disable_cgi_scanning
Exploit Ease: Exploits are available
Exploited by Nessus: true
Reference Information
BID: 31381