Korean
<< Back
VID 21107
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The remote web server appears to be running O'Reilly WebSite and the '/cgi-dos/args.bat' CGI is installed on the server.
The args.bat program included with O'Reilly WebSite versions previous to 2.0 allows a remote attacker to execute arbitrary commands on the server with the privileges of httpd daemon.
The exploit can be:

http://website.host/cgi-dos/args.bat?"&any+dos+command"
Recommendation Remove the sample program including '/cgi-dos/args.bat' file from the CGI directories and upgrade to the latest version of WebSite.
Related URL CVE-1999-1180 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)