Lucene search

K
nessusThis script is Copyright (C) 2002-2021 Tenable Network Security, Inc.VPASSWD_CGI.NASL
HistoryNov 25, 2002 - 12:00 a.m.

vpopmail-CGIApps vpasswd.cgi Remote Command Execution

2002-11-2500:00:00
This script is Copyright (C) 2002-2021 Tenable Network Security, Inc.
www.tenable.com
78

The ‘vpasswd.cgi’ CGI is installed. Some versions do not properly check for special characters and allow an attacker to execute any command on your system.

Warning : Nessus solely relied on the presence of this CGI, it did not determine if you specific version is vulnerable to that problem

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

# References
# Date: Thu, 24 Oct 2002 10:41:48 -0700 (PDT)
# From:"Jeremy C. Reed" <[email protected]>
# To:[email protected]
# Subject: Re: vpopmail CGIapps vpasswd vulnerabilities
# In-Reply-To: <[email protected]>
# Message-ID: <[email protected]>
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
 script_id(11165);
 script_version("1.22");
 script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");

 script_bugtraq_id(6038);

 script_name(english:"vpopmail-CGIApps vpasswd.cgi Remote Command Execution");
 script_summary(english:"Checks for the presence of vpasswd.cgi");

 script_set_attribute(attribute:"synopsis", value:
"The remote host has a CGI installed which allow arbitrary code
execution on the remote system.");
 script_set_attribute(attribute:"description", value:
"The 'vpasswd.cgi' CGI is installed. Some versions do not properly
check for special characters and allow an attacker to execute any
command on your system.

Warning : Nessus solely relied on the presence of this CGI, it did not
determine if you specific version is vulnerable to that problem");
 script_set_attribute(attribute:"solution", value:"remove it from /cgi-bin.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");

 script_set_attribute(attribute:"vuln_publication_date", value:"2002/10/24");
 script_set_attribute(attribute:"plugin_publication_date", value:"2002/11/25");

 script_set_attribute(attribute:"potential_vulnerability", value:"true");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2002-2021 Tenable Network Security, Inc.");
 script_family(english:"CGI abuses");

 script_dependencie("http_version.nasl", "find_service1.nasl", "no404.nasl");
 script_require_keys("Settings/ParanoidReport");
 script_require_ports("Services/www", 80);

 exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

if (report_paranoia < 2) audit(AUDIT_PARANOID);

port = get_http_port(default:80);

if (is_cgi_installed3(port: port, item:"/vpasswd.cgi"))
  security_hole(port);