The 'pagelog.cgi' cgi is installed. This CGI has
a well known security flaw that lets an attacker create arbitrary
files on the remote server, ending in .txt, and reading arbitrary
files ending in .txt or .log
*** Warning : this flaw was not tested by Nessus. Check the existence
of /tmp/nessus_pagelog_cgi.txt on this host to find out if you
are vulnerable or not.
Solution : remove it from /cgi-bin.
Risk factor : High
BugTraq ID: 1864|
Common Vulnerability Exposure (CVE) ID: CVE-2000-0940
Bugtraq: 20001029 Minor bug in Pagelog.cgi (Google Search)
XForce ISS Database: pagelog-cgi-dir-traverse(5451)
|Copyright||This script is Copyright (C) 2000 Renaud Deraison|
|This is only one of 73533 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.