Vulnerabilities > CVE-1999-0147 - Unspecified vulnerability in University of Arizona Glimpse Http and Webglimpse

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
university-of-arizona
nessus
exploit available

Summary

The aglimpse CGI program of the Glimpse package allows remote execution of arbitrary commands.

Vulnerable Configurations

Part Description Count
Application
University_Of_Arizona
2

Exploit-Db

descriptionGlimpseHTTP 1.0/2.0 and WebGlimpse 1.0 Piped Command Vulnerability. CVE-1999-0147 . Remote exploit for unix platform
idEDB-ID:20449
last seen2016-02-02
modified1996-07-03
published1996-07-03
reporterRazvan Dragomirescu
sourcehttps://www.exploit-db.com/download/20449/
titleGlimpseHTTP 1.0/2.0 and WebGlimpse 1.0 Piped Command Vulnerability

Nessus

NASL familyCGI abuses
NASL idGLIMPSE.NASL
descriptionThe remote web server is running GlipmseHTTP. The installed version suffers from a remote command execution vulnerability in the
last seen2020-06-01
modified2020-06-02
plugin id10095
published1999-08-19
reporterThis script is Copyright (C) 1999-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/10095
titleGlimpse HTTP aglimpse Arbitrary Command Execution
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
 script_id(10095);
 script_version("1.32");
 script_cvs_date("Date: 2018/06/13 18:56:27");

 script_cve_id("CVE-1999-0147");
 script_bugtraq_id(2026);

 script_name(english:"Glimpse HTTP aglimpse Arbitrary Command Execution");
 script_summary(english:"Checks for the presence of /cgi-bin/phf");

 script_set_attribute(attribute:"synopsis", value:
"The remote web server is running a web application that is affected by
an arbitrary command execution vulnerability.");
 script_set_attribute(attribute:"description", value:
"The remote web server is running GlipmseHTTP. The installed version
suffers from a remote command execution vulnerability in the
'aglimpse' component.

Note that we could not actually check for the presence of this
vulnerability, and only checked for the existence of the 'aglimpse'
CGI.");
 script_set_attribute(attribute:"solution", value:"There is no known solution at this time.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:F/RL:W/RC:ND");

 script_set_attribute(attribute:"vuln_publication_date", value:"1997/07/02");
 script_set_attribute(attribute:"plugin_publication_date", value:"1999/08/19");

 script_set_attribute(attribute:"potential_vulnerability", value:"true");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 1999-2018 Tenable Network Security, Inc.");
 script_family(english:"CGI abuses");

 script_dependencie("http_version.nasl", "find_service1.nasl", "no404.nasl");
 script_require_keys("Settings/ParanoidReport");
 script_require_ports("Services/www", 80);

 exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

if (report_paranoia < 2) audit(AUDIT_PARANOID);

port = get_http_port(default:80);
cgi = "aglimpse";
if (is_cgi_installed3(item:cgi,port:port)) security_hole(port);