Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Count.cgi


Vulnerability Assessment Details

Count.cgi

Vulnerability Assessment Summary
Checks Count.cgi version

Detailed Explanation for this Vulnerability Assessment

An old version of 'Count.cgi' cgi is installed.
It has a well documented security flaw that lets anyone execute arbitrary
commands with the rights of the http daemon (root, nobody, www...)

** Note that Nessus only checked the version number

Solution : upgrade to wwwcount 2.4 or later.

Network Security Threat Level: High

Networks Security ID: 128

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Michel Arboi

Cables, Connectors

Mid-Level Dell PowerEdge R420 Server 2x 2.20Ghz E5-2430 6C 48GB 4x 1TB
$651.14
Mid-Level Dell PowerEdge R420 Server 2x 2.20Ghz E5-2430 6C 48GB 4x 1TB pictureIntel XEON E5-2603 V2 Quadcore 1.80 GHz 10 MB Cache (formerly Ivy Bridge EP)
$85.0
Intel XEON E5-2603 V2 Quadcore 1.80 GHz 10 MB Cache (formerly Ivy Bridge EP) pictureDell Vostro 230 Xeon Quad 3.0GHZ 4GB 250GB Window 7 PRO PC Workstation I3 I5 SFF
$105.0
Dell Vostro 230 Xeon Quad 3.0GHZ 4GB 250GB Window 7 PRO PC Workstation I3 I5 SFF pictureLot of 2 Intel Xeon processors 3131A449-0666 2000DP/512L2/400/1.8v NO RESERVE
$25.99
Lot of 2 Intel Xeon processors 3131A449-0666 2000DP/512L2/400/1.8v NO RESERVE picture


Discussions

No Discussions have been posted on this vulnerability.