CGI Generic Injectable Parameter

info Nessus Plugin ID 47830


Some CGIs are candidate for extended injection tests.


Nessus was able to to inject innocuous strings into CGI parameters and read them back in the HTTP response.

The affected parameters are candidates for extended injection tests like cross-site scripting attacks.

This is not a weakness per se, the main purpose of this test is to speed up other scripts. The results may be useful for a human pen-tester.

Plugin Details

Severity: Info

ID: 47830

File Name: torture_cgi_injectable_param.nasl

Version: 1.16

Type: remote

Family: CGI abuses

Published: 7/26/2010

Updated: 1/19/2021

Vulnerability Information

Required KB Items: Settings/enable_web_app_tests

Reference Information

CWE: 86