Lucene search

K

RedHat 6.0 cachemgr.cgi

🗓️ 03 Nov 2005 00:00:00Reported by This script is Copyright (C) 1999 A. de BernisType 
openvas
 openvas
🔗 plugins.openvas.org👁 46 Views

RedHat 6.0 cachemgr.cgi vulnerability foun

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Code
ReporterTitlePublishedViews
Family
OpenVAS
FreeBSD Ports: squid
4 Sep 200800:00
openvas
OpenVAS
FreeBSD Ports: squid
4 Sep 200800:00
openvas
OpenVAS
RedHat 6.0 cachemgr.cgi
3 Nov 200500:00
openvas
OpenVAS
Debian Security Advisory DSA 576-1 (squid)
17 Jan 200800:00
openvas
OpenVAS
Debian: Security Advisory (DSA-576-1)
17 Jan 200800:00
openvas
OpenVAS
SLES9: Security update for squid
10 Oct 200900:00
openvas
OpenVAS
SLES9: Security update for squid
10 Oct 200900:00
openvas
Tenable Nessus
Squid cachemgr.cgi Proxied Port Scanning
22 Aug 199900:00
nessus
Tenable Nessus
FreeBSD : squid -- possible abuse of cachemgr.cgi (a395397c-c7c8-11d9-9e1e-c296ac722cb3)
13 Jul 200500:00
nessus
Tenable Nessus
Debian DSA-576-1 : squid - several vulnerabilities
10 Nov 200400:00
nessus
Rows per page
# OpenVAS Vulnerability Test
# $Id: cachemgr_cgi.nasl 8023 2017-12-07 08:36:26Z teissa $
# Description: RedHat 6.0 cachemgr.cgi
#
# Authors:
# Alexis de Bernis <[email protected]>
#
# Copyright:
# Copyright (C) 1999 A. de Bernis
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2,
# as published by the Free Software Foundation
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
#

tag_summary = "RedHat Linux 6.0 installs by default a squid cache manager cgi script with
no restricted access permissions. This script could be used to perform a
port scan from the cgi-host machine.";

tag_solution = "If you are not using the box as a Squid www proxy/cache server then
uninstall the package by executing:
/etc/rc.d/init.d/squid stop ; rpm -e squid

If you want to continue using the Squid proxy server software, make the
following actions to tighten security access to the manager interface:
mkdir /home/httpd/protected-cgi-bin
mv /home/httpd/cgi-bin/cachemgr.cgi /home/httpd/protected-cgi-bin/

And add the following directives to /etc/httpd/conf/access.conf and
srm.conf:

--- start access.conf segment ---
# Protected cgi-bin directory for programs that
# should not have public access
order deny,allow
deny from all
allow from localhost
#allow from .your_domain.com
AllowOverride None
Options ExecCGI
--- end access.conf segment ---

--- start srm.conf segment ---
ScriptAlias /protected-cgi-bin/ /home/httpd/protected-cgi-bin/
--- end srm.conf segment ---";


if(description)
{
 script_id(10034);
 script_version("$Revision: 8023 $");
 script_tag(name:"last_modification", value:"$Date: 2017-12-07 09:36:26 +0100 (Thu, 07 Dec 2017) $");
 script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
 script_bugtraq_id(2059);
 script_tag(name:"cvss_base", value:"7.5");
 script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_tag(name:"qod_type", value:"remote_banner_unreliable");
 script_cve_id("CVE-1999-0710");
 name = "RedHat 6.0 cachemgr.cgi";
 script_name(name);
 
 
 
 script_category(ACT_GATHER_INFO);
 
 
 script_copyright("This script is Copyright (C) 1999 A. de Bernis");
 family = "Web application abuses";
 script_family(family);
 script_dependencies("find_service.nasl",  "no404.nasl");
 script_require_ports("Services/www", 80);
 script_tag(name : "solution" , value : tag_solution);
 script_tag(name : "summary" , value : tag_summary);
 exit(0);
}

#
# The script code starts here
#

include("http_func.inc");
include("http_keepalive.inc");
include("global_settings.inc");

port = get_http_port(default:80);

cgi = "cachemgr.cgi";
res = is_cgi_installed_ka(item:cgi, port:port);
if(res)security_message(port);

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
03 Nov 2005 00:00Current
0.5Low risk
Vulners AI Score0.5
EPSS0.12632
46
.json
Report