|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> CGI abuses >> PGPMail.pl detection Vulnerability Assessment Details
|
PGPMail.pl detection |
||
Searches for the existence of PGPMail.pl Detailed Explanation for this Vulnerability Assessment The 'PGPMail.pl' CGI is installed. Some versions (up to v1.31 a least) of this CGI do not properly filter user input before using it inside commands. This would permit a cracker to run any command on your server. *** Note: Nessus just checked the existence of this CGI *** but did not try to exploit the flaws. Solution : remove it from /cgi-bin or upgrade it. Reference : http://online.securityfocus.com/archive/82/243262 Reference : http://online.securityfocus.com/archive/1/243408 Network Security Threat Level: High Networks Security ID: 3605 Vulnerability Assessment Copyright: This script is Copyright (C) 2002 Michel Arboi |
||
Cables, Connectors |
|
||
No Discussions have been posted on this vulnerability. |