Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Sambar Web Server CGI scripts


Vulnerability Assessment Details

Sambar Web Server CGI scripts

Vulnerability Assessment Summary
Searches for the existence of /cgi-bin/{hello,echo}.bat

Detailed Explanation for this Vulnerability Assessment

At least one of these CGI scripts is installed :

hello.bat
echo.bat

They permit any attacker to execute commands with the rights of the web
server process.

Solution : Delete all the *.bat files from your cgi-bin/ directory
Network Security Threat Level: High

Networks Security ID: 1002

Vulnerability Assessment Copyright: This script is Copyright (C) 2000 Renaud Deraison

Cables, Connectors

Intel Core Xeon X3430 (#090-1649) 2.4GHz 8MB 2.5GT/s SLBLJ LGA1156 Processor
$12.95
Intel Core Xeon X3430 (#090-1649) 2.4GHz 8MB 2.5GT/s SLBLJ LGA1156 Processor pictureLenovo T410 14.1" Core i5 Windows 7 Pro Laptop 160GB 8GB RAM FireWire eSATA DVD
$129.0
Lenovo T410 14.1Microsoft Surface Book- 256GB / Intel Core i5 6th gen, 8GB/dGP, 13.5"PixelSense
$1469.99
Microsoft Surface Book- 256GB / Intel Core i5 6th gen, 8GB/dGP, 13.5Open-Box: Apple - MacBook Pro® - 13" Display - Intel Core i5 - 8 GB Memory -...
$1299.99
Open-Box: Apple - MacBook Pro® - 13


Discussions

No Discussions have been posted on this vulnerability.