|Title:||Windmail.exe allows any user to execute arbitrary commands|
The 'windmail.exe' CGI is installed.
Some versions of this CGI script have a security flaw that lets
an attacker execute arbitrary commands on the remote server.
To test this, make the following request :
(replace email@example.com by your real email address).
If you receive the content of the file boot.ini,
then your server is vulnerable.
Solution : remove it from /cgi-bin. See www.geocel.com
for a new version.
Risk factor : High
BugTraq ID: 1073|
Common Vulnerability Exposure (CVE) ID: CVE-2000-0242
Bugtraq: 20000325 Windmail allow web user get any file (Google Search)
XForce ISS Database: windmail-fileread
XForce ISS Database: windmail-pipe-command
|Copyright||This script is Copyright (C) 2000 Renaud Deraison|
|This is only one of 69903 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.