|Category:||Web application abuses|
|Summary:||The 'guestbook.cgi' is installed. This CGI has; a well known security flaw that lets anyone execute arbitrary; commands with the privileges of the http daemon (root or nobody).|
The 'guestbook.cgi' is installed. This CGI has
a well known security flaw that lets anyone execute arbitrary
commands with the privileges of the http daemon (root or nobody).
remove it from /cgi-bin.
BugTraq ID: 776|
Common Vulnerability Exposure (CVE) ID: CVE-1999-0237
XForce ISS Database: http-cgi-guestbook
Cert/CC Advisory: VB-97.02
|Copyright||This script is Copyright (C) 1999 Mathieu Perrin|
|This is only one of 69903 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.