|Summary:||Checks for the presence of /cgi-bin/pals-cgi|
The 'pals-cgi' CGI is installed. This CGI has
a well known security flaw that lets an attacker read arbitrary files
with the privileges of the http daemon (usually root or nobody).
Solution : remove it from /cgi-bin.
Risk factor : High
BugTraq ID: 2372|
Common Vulnerability Exposure (CVE) ID: CVE-2001-0216
Bugtraq: 20010212 PALS Library System "show files" Vulnerability and remote command execution (Google Search)
XForce ISS Database: webpals-library-cgi-url(6102)
|Copyright||This script is Copyright (C) 2001 Renaud Deraison|
|This is only one of 58962 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.