|Summary:||Checks for the presence of /cgi-bin/plusmail|
The 'plusmail' CGI is installed. Some
versions of this CGI have a well known security flaw that
lets an attacker read arbitrary
file with the privileges of the http daemon
(usually root or nobody).
Solution : remove it from /cgi-bin. No patch yet
Risk factor : High
BugTraq ID: 2653|
Common Vulnerability Exposure (CVE) ID: CVE-2000-0074
Bugtraq: 20000111 PowerScripts PlusMail Vulnerablity (Google Search)
|Copyright||This script is Copyright (C) 1999 Renaud Deraison|
|This is only one of 58962 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.