Family: CGI abuses --> Category: infos
BasiliX Arbitrary Command Execution Vulnerability Vulnerability Scan
Vulnerability Scan Summary
Checks for arbitrary command execution vulnerability in BasiliX
Detailed Explanation for this Vulnerability Test
The remote web server contains a PHP script that is prone to arbitrary
The remote host appears to be running a version of BasiliX between
1.0.2beta or 1.0.3beta. In such versions, the script 'login.php3'
fails to sanitize user input, which enables a remote attacker to pass
in a specially crafted value for the parameter 'username' with
arbitrary commands to be executed on the target using the permissions
of the web server.
See also :
Upgrade to BasiliX version 1.1.0 or later.
High / CVSS Base Score : 7
Click HERE for more information and discussions on this network vulnerability scan.