![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.10938 |
Kategorie: | Web Servers |
Titel: | Apache HTTP Server Remote Command Execution via .bat files |
Zusammenfassung: | The Apache HTTP Server 2.0.x Win32 installation is shipped with a; default script, /cgi-bin/test-cgi.bat, that allows an attacker to execute; commands on the Apache server (although it is reported that any .bat file; could open this vulnerability.) |
Beschreibung: | Summary: The Apache HTTP Server 2.0.x Win32 installation is shipped with a default script, /cgi-bin/test-cgi.bat, that allows an attacker to execute commands on the Apache server (although it is reported that any .bat file could open this vulnerability.) Vulnerability Impact: An attacker can send a pipe character with commands appended as parameters, which are then executed by Apache. Solution: This bug is fixed in 1.3.24 and 2.0.34-beta, or remove /cgi-bin/test-cgi.bat. CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2002-0061 BugTraq ID: 4335 http://www.securityfocus.com/bid/4335 Bugtraq: 20020321 Vulnerability in Apache for Win32 batch file processing - Remote command execution (Google Search) http://marc.info/?l=bugtraq&m=101674082427358&w=2 Bugtraq: 20020325 Apache 1.3.24 Released! (fwd) (Google Search) http://online.securityfocus.com/archive/1/263927 https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e@%3Ccvs.httpd.apache.org%3E http://www.iss.net/security_center/static/8589.php |
Copyright | Copyright (C) 2002 Matt Moore |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |