Korean
<< Back
VID 21020
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The web server has the vulnerable CGI ad.cgi.
ad.cgi by Lief M. Wright is a Perl script freely available for managing rotating banner ads on the web page. This ad.cgi has a vulnerability that allows a remote attacker to execute arbitrary command due to insufficient checking of the input validation. When a remote attacker makes uses of the FORM method with a malicious input string such as shell metacharacters as the following request, this ad.cgi fails to correctly check user's input.

POST /cgi-bin/ad.cgi/../../../../../../../../bin/ping -c 5 www.victim.com HTTP/1.0

Thus, a remote attacker can execute arbitrary command on the system with privileges of the web server using this vulnerability.

* Note: This check solely relied on the presence of the relevant CGI to assess this vulnerability, so this might be a false positive.

* References:
http://archives.neohapsis.com/archives/bugtraq/2000-12/0143.html

* Softwares Affected:
Lief M. Wright ad.cgi 1.0
Recommendation No the Patch available as of June 2014. Contact with the product's vendor.
As a workaround, delete the ad.cgi file from the web server.
Related URL CVE-2001-0025 (CVE)
Related URL 2103 (SecurityFocus)
Related URL 5741 (ISS)