Korean
<< Back
VID 21220
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Sambar web server has HELLO.BAT and ECHO.BAT in the CGI directory.
Sambar Server is a multi-threaded HTTP, FTP and Proxy server for Windows environments. The default installation of Sambar server, places two batch files in the server's /cgi-bin/ directory.
Those two batch files - ECHO.BAT and HELLO.BAT- are simple files with just one "echo" command in them. The .BAT files such as these two files can cause a lot of trouble, which allows remote attackers to execute commands with the privileges of the web server process. Any DOS batch script (*.BAT) can pose a security risk and should be avoided.
This vulnerability only affects Sambar Server running on Windows NT or Windows 2000.

For example, the request as the follow:

http://target_host/cgi-bin/hello.bat?&dir+c:\

will display the directory listing of drive C:\

* Note : This check item only checks whether there are these two batch files in the CGI directory.

* References:
http://www.securityfocus.com/bid/1002
http://www.iss.net/security_center/static/3999.php
Recommendation Remove all *.bat (batch) files, including echo.bat and hello.bat, from your server's CGI-BIN directory.

-- OR --

Upgrade to the Sambar version 4.2 beta 8 or later, which no longer includes these batch files.
Related URL CVE-2000-0213 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)