|
Family: CGI abuses --> Category: infos
BasiliX Arbitrary Command Execution Vulnerability Vulnerability Scan
Vulnerability Scan Summary Checks for arbitrary command execution vulnerability in BasiliX
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a PHP script that is prone to arbitrary
command execution.
Description :
The remote host appears to be running a version of BasiliX between
1.0.2beta or 1.0.3beta. In such versions, the script 'login.php3'
fails to sanitize user input, which enables a remote attacker to pass
in a specially crafted value for the parameter 'username' with
arbitrary commands to be executed on the target using the permissions
of the web server.
See also :
http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2001-09/0017.html
Solution :
Upgrade to BasiliX version 1.1.0 or later.
Threat Level:
High / CVSS Base Score : 7
(AV:R/AC:L/Au:NR/C:P/A:P/I:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|