Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
PARTIAL network
low complexity
oreilly
nessus
Published: 1999-02-16
Updated: 2008-09-10
Summary
O'Reilly WebSite 1.1e and Website Pro 2.0 allows remote attackers to execute arbitrary commands via shell metacharacters in an argument to (1) args.cmd or (2) args.bat. O'Reilly has corrected this issue in WebSite Professional 2.5, which is now available from: http://website.oreilly.com
Vulnerable Configurations
Part | Description | Count |
Application | Oreilly | 4 |
Nessus
NASL family | CGI abuses |
NASL id | ARGS_BAT.NASL |
description | The CGI |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 11465 |
published | 2003-03-25 |
reporter | This script is Copyright (C) 2003-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/11465 |
title | O'Reilly WebSite Pro args.bat Arbitrary Command Execution |
code | #
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(11465);
script_version("1.19");
script_cvs_date("Date: 2018/11/15 20:50:16");
script_cve_id("CVE-1999-1180");
script_name(english:"O'Reilly WebSite Pro args.bat Arbitrary Command Execution");
script_summary(english:"Checks for the presence of /cgi-dos/args.bat");
script_set_attribute(attribute:"synopsis", value:
"The remote website is susceptible to a remote command execution
attack.");
script_set_attribute(attribute:"description", value:
"The CGI 'args.bat' (and/or 'args.cmd') is installed. This CGI has a
well known security flaw that lets an attacker upload arbitrary files
on the remote web server.");
script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/1999/Feb/309");
script_set_attribute(attribute:"solution", value:"There is no known solution at this time.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
script_set_attribute(attribute:"vuln_publication_date", value:"1999/02/16");
script_set_attribute(attribute:"plugin_publication_date", value:"2003/03/25");
script_set_attribute(attribute:"potential_vulnerability", value:"true");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2003-2018 Tenable Network Security, Inc.");
script_family(english:"CGI abuses");
script_dependencie("http_version.nasl", "find_service1.nasl", "no404.nasl");
script_require_keys("Settings/ParanoidReport");
script_require_ports("Services/www", 80);
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
if (report_paranoia < 2) audit(AUDIT_PARANOID);
port = get_http_port(default:80);
res = is_cgi_installed3(item:"/cgi-dos/args.bat", port:port);
if (isnull(res)) exit (0);
if (res) { security_warning(port); exit(0); }
res = is_cgi_installed3(item:"/cgi-dos/args.cmd", port:port);
if (isnull(res)) exit (0);
if (res) { security_warning(port); exit(0); }
|