AjaXplorer checkInstall.php Arbitrary Command Injection

high Nessus Plugin ID 45489


The remote web application has an arbitrary command injection vulnerability.


The version of AjaXplorer running on the remote web server has a command injection vulnerability. Input passed to the 'destServer' parameter of 'checkInstall.php' is used in a call to popen() without being properly sanitized.

A remote, unauthenticated attacker could exploit this to execute arbitrary commands on the system subject to the privileges of the web server user.

This version of AjaXplorer likely has other vulnerabilities, though Nessus has not checked for those issues.


Upgrade to AjaXplorer version 2.6 / 2.7.1 or later.

See Also


Plugin Details

Severity: High

ID: 45489

File Name: ajaxplorer_checkinstall_cmd_injection.nasl

Version: 1.23

Type: remote

Family: CGI abuses

Published: 4/12/2010

Updated: 6/1/2022

Configuration: Enable thorough checks

Risk Information


Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

Required KB Items: www/ajaxplorer

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No known exploits are available

Exploited by Nessus: true

Patch Publication Date: 4/4/2010

Vulnerability Publication Date: 4/4/2010

Exploitable With

Metasploit (AjaXplorer checkInstall.php Remote Command Execution)

Elliot (AjaXplorer 2.5.5 RCE (Windows))

Reference Information

BID: 39334