| VID |
21020 |
| Severity |
40 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The web server has the vulnerable CGI ad.cgi. ad.cgi by Lief M. Wright is a Perl script freely available for managing rotating banner ads on the web page. This ad.cgi has a vulnerability that allows a remote attacker to execute arbitrary command due to insufficient checking of the input validation. When a remote attacker makes uses of the FORM method with a malicious input string such as shell metacharacters as the following request, this ad.cgi fails to correctly check user's input.
POST /cgi-bin/ad.cgi/../../../../../../../../bin/ping -c 5 www.victim.com HTTP/1.0
Thus, a remote attacker can execute arbitrary command on the system with privileges of the web server using this vulnerability.
* Note: This check solely relied on the presence of the relevant CGI to assess this vulnerability, so this might be a false positive.
* References: http://archives.neohapsis.com/archives/bugtraq/2000-12/0143.html
* Softwares Affected: Lief M. Wright ad.cgi 1.0 |
| Recommendation |
No the Patch available as of June 2014. Contact with the product's vendor. As a workaround, delete the ad.cgi file from the web server. |
| Related URL |
CVE-2001-0025 (CVE) |
| Related URL |
2103 (SecurityFocus) |
| Related URL |
5741 (ISS) |
|