VID |
21227 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
An Windows CGI interpreter file was found in a CGI bin directory on the Web server. A common Web server misconfiguration is to put a shell interpreter (cmd.exe) in the CGI bin directory (like /cgi-bin/, /scripts/). Also, some early Web server documentation stated that CGI script interpreters (such as perl.exe, java.exe, etc.) should be placed in the CGI bin directory. Placement of shell interpreters and CGI script interpreters in the CGI bin directory could allow a remote attacker to execute arbitrary commands through the interpreters. By sending a specially-crafted HTTP request, a remote attacker could cause these shells to execute arbitrary commands on the server.
* References: http://www.cert.org/advisories/CA-1996-11.html
* Platforms Affected: Any HTTP server Any version Microsoft Windows Any version |
Recommendation |
If any CGI programs rely on CGI script or shell interpreter access, move the interpreter outside the www root, and modify the CGI programs to look for the interpreter in the new location.
-- AND --
If no programs use the CGI script or shell interpreter, remove it from the CGI bin directory. |
Related URL |
CVE-1999-0509 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
146 (ISS) |
|