|
Family: CGI abuses --> Category: infos
ows-bin Vulnerability Scan
Vulnerability Scan Summary Checks if ows-bin is vulnerable
Detailed Explanation for this Vulnerability Test
Oracle's Web Listener (a component of the Oracle Application Server),
is installed and can be used by a remote attacker to run arbitrary
commands on the web server.
Read more about this hole at:
http://www.securiteam.com/windowsntfocus/Oracle_Web_Listener_4_0_x_CGI_vulnerability.html
Solution : If 'ows-bin' is the default CGI directory used by the Oracle Application Server Manager,
then remove the ows-bin virtual directory or point it to a more benign directory.
If 'ows-bin' is not the default then verify that there are no batch files in this directory.
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|