Vulnerability Scanning Solutions, LLC.
Our Process
What We Scan For
Sample Report
Client List
Contact Us
What We Scan For
Family: CGI abuses --> Category: infos

Shells in /cgi-bin Vulnerability Scan

Vulnerability Scan Summary
Searches for the existence of various shells in /cgi-bin

Detailed Explanation for this Vulnerability Test

The remote web server has one of these shells installed
in /cgi-bin :
ash, bash, csh, ksh, sh, tcsh, zsh

Leaving executable shells in the cgi-bin directory of
a web server may allow a possible hacker to execute arbitrary
commands on the target machine with the rights of the
http daemon (usually root or nobody).

Solution : Remove all the shells from /cgi-bin.

Threat Level: High

Click HERE for more information and discussions on this network vulnerability scan.


P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.