Vulnerabilities > CVE-1999-1180 - Remote Security vulnerability in Oreilly Website and Website PRO

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
oreilly
nessus

Summary

O'Reilly WebSite 1.1e and Website Pro 2.0 allows remote attackers to execute arbitrary commands via shell metacharacters in an argument to (1) args.cmd or (2) args.bat. O'Reilly has corrected this issue in WebSite Professional 2.5, which is now available from: http://website.oreilly.com

Vulnerable Configurations

Part Description Count
Application
Oreilly
4

Nessus

NASL familyCGI abuses
NASL idARGS_BAT.NASL
descriptionThe CGI
last seen2020-06-01
modified2020-06-02
plugin id11465
published2003-03-25
reporterThis script is Copyright (C) 2003-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/11465
titleO'Reilly WebSite Pro args.bat Arbitrary Command Execution
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
 script_id(11465);
 script_version("1.19");
 script_cvs_date("Date: 2018/11/15 20:50:16");

 script_cve_id("CVE-1999-1180");

 script_name(english:"O'Reilly WebSite Pro args.bat Arbitrary Command Execution");
 script_summary(english:"Checks for the presence of /cgi-dos/args.bat");

 script_set_attribute(attribute:"synopsis", value:
"The remote website is susceptible to a remote command execution
attack.");
 script_set_attribute(attribute:"description", value:
"The CGI 'args.bat' (and/or 'args.cmd') is installed. This CGI has a
well known security flaw that lets an attacker upload arbitrary files
on the remote web server.");
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/1999/Feb/309");
 script_set_attribute(attribute:"solution", value:"There is no known solution at this time.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");

 script_set_attribute(attribute:"vuln_publication_date", value:"1999/02/16");
 script_set_attribute(attribute:"plugin_publication_date", value:"2003/03/25");

 script_set_attribute(attribute:"potential_vulnerability", value:"true");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_end_attributes();


 script_category(ACT_GATHER_INFO);

 script_copyright(english:"This script is Copyright (C) 2003-2018 Tenable Network Security, Inc.");
 script_family(english:"CGI abuses");

 script_dependencie("http_version.nasl", "find_service1.nasl", "no404.nasl");
 script_require_keys("Settings/ParanoidReport");
 script_require_ports("Services/www", 80);
 exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

if (report_paranoia < 2) audit(AUDIT_PARANOID);

port = get_http_port(default:80);

res = is_cgi_installed3(item:"/cgi-dos/args.bat", port:port);
if (isnull(res)) exit (0);
if (res) { security_warning(port); exit(0); }

res = is_cgi_installed3(item:"/cgi-dos/args.cmd", port:port);

if (isnull(res)) exit (0);
if (res) { security_warning(port); exit(0); }