Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> WPS wps_shop.cgi remote command execution flaw


Vulnerability Assessment Details

WPS wps_shop.cgi remote command execution flaw

Vulnerability Assessment Summary
Checks for WPS wps_shop.cgi remote command execution flaw

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote web server contains a CGI script that is prone to arbitrary
command execution.

Description :

The remote host is running the WPS Web-Portal-System.

The version of this software installed on the remote host is
vulnerable to remote command execution flaw through the argument 'art'
of the script 'wps_shop.cgi'. A malicious user could exploit this
flaw to execute arbitrary commands on the remote host.

See also :

http://www.securityfocus.com/archive/1/405100

Solution :

Disable or delete this script.

Network Security Threat Level:

High / CVSS Base Score : 7
(AV:R/AC:L/Au:NR/C:P/A:P/I:P/B:N)

Networks Security ID: 14245

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

Juniper MAG-SM360 Junos Pulse Gateway Rev. A 650-036300 Rev. 04 with HDD
$2950.0
Juniper MAG-SM360 Junos Pulse Gateway Rev. A 650-036300 Rev. 04 with HDD  pictureJuniper SRX-GP-QUAD-T1-E1 4-Port Expansion Module
$245.0
Juniper SRX-GP-QUAD-T1-E1 4-Port Expansion Module pictureJuniper SRX1K-SYSIO-XGE
$145.0
Juniper SRX1K-SYSIO-XGE pictureJUNIPER NETWORKS FFANTRAY-MX960-S-C Front Fan Tray w (6) NMB-MAT
$49.88
JUNIPER NETWORKS FFANTRAY-MX960-S-C Front Fan Tray w (6) NMB-MAT picture


Discussions

No Discussions have been posted on this vulnerability.