VID |
21224 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
An UNIX shell interpreter file was found in a CGI bin directory on the Web server. A common Web server misconfiguration is to put shell interpreters (such as sh, csh, ksh, bash, etc.) in the CGI bin directory (like /cgi-bin/, /scripts/). Also, some early Web server documentation stated that CGI script interpreters (such as Perl, Tcl, etc.) should be placed in the CGI bin directory. Placement of shell interpreters and CGI script interpreters in the CGI bin directory could allow a remote attacker to execute arbitrary commands through the interpreters. By sending a specially-crafted HTTP request, a remote attacker could cause these shells to execute arbitrary commands on the server.
* References: http://www.cert.org/advisories/CA-1996-11.html
* Platforms Affected: Any HTTP server Any version Unix Any version Linux Any version |
Recommendation |
If any CGI bin programs rely on shell interpreter access, move the shell interpreter outside the www root, and modify the CGI bin programs to look for the shell interpreter in the new location.
-- AND --
If no programs use the shell interpreter, remove it from the CGI bin directory. |
Related URL |
CVE-1999-0509 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
146 (ISS) |
|