Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Athena Web Registration remote command execution flaw


Vulnerability Assessment Details

Athena Web Registration remote command execution flaw

Vulnerability Assessment Summary
Checks for Athena Web Registration remote command execution flaw

Detailed Explanation for this Vulnerability Assessment

The remote host is running Athena Web server.

The remote version of this software is vulnerable to remote command
execution flaw through the athenareg.php script.

A malicious user could execute arbitrary commands on the remote host.

Solution: No update currently available, use another web server
Network Security Threat Level: High

Networks Security ID: 9349

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 David Maciejak

Cables, Connectors

Microsoft Windows Server 2012 R2 Standard Edition 50 User + 50 Device RDS Cal
$55.0
Microsoft Windows Server 2012 R2 Standard Edition 50 User + 50 Device RDS Cal pictureTeles Vgate Igate Sim server Tech-support 24/7/365 Custom software development
$500.0
Teles Vgate Igate Sim server Tech-support 24/7/365 Custom software development pictureHP NC7170 PCI-X Dual Port 1000T Gigabit Server Adapter C23333-005 313559-001
$2.64
HP NC7170 PCI-X Dual Port 1000T Gigabit Server Adapter C23333-005 313559-001 pictureWindows Server 2008 R2 Standard x64 Full 4 CPU License + Install
$150.0
Windows Server 2008 R2 Standard x64 Full 4 CPU License + Install picture


Discussions

No Discussions have been posted on this vulnerability.