Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> WebLibs File Disclosure


Vulnerability Assessment Details

WebLibs File Disclosure

Vulnerability Assessment Summary
Searches for the existence of a WebLibs File Disclosure

Detailed Explanation for this Vulnerability Assessment

The remote host is running 'WebLibs', a CGI written in Perl.

Due to incorrect parsing of incoming data, a possible hacker can
cause the CGI to return arbitrary files as the result of the CGI.

Solution : Delete weblibs.pl
Risk factor: High

Networks Security ID: 11848

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Noam Rathaus

Cables, Connectors

1Pc 20CM 4Pin to 8Pin CPU Power Converter Cable Lead Adapter Office SuppliesRDR
$3.53
1Pc 20CM 4Pin to 8Pin CPU Power Converter Cable Lead Adapter Office SuppliesRDR picturePlastic CPU Fan Bracket Base Blue 3pcs for AMD AM2 AM2+ AM3 AM3+ FM1 socket
$7.88
Plastic CPU Fan Bracket Base Blue 3pcs for AMD AM2 AM2+ AM3 AM3+ FM1 socket pictureIntel Pentium G6950 2.8GHz Dual-Core Processor ( Working )
$3.9
Intel Pentium G6950 2.8GHz Dual-Core Processor ( Working ) pictureIntel Core i5-2400 3.1GHz Quad-Core (BX80623I52400) Processor
$12.0
Intel Core i5-2400 3.1GHz Quad-Core (BX80623I52400) Processor picture


Discussions

No Discussions have been posted on this vulnerability.