Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> args.bat


Vulnerability Assessment Details

args.bat

Vulnerability Assessment Summary
Searches for the existence of /cgi-dos/args.bat

Detailed Explanation for this Vulnerability Assessment

The CGI 'args.bat' (and/or 'args.cmd') is installed. This CGI has
a well documented security flaw that lets a possible hacker upload
arbitrary files on the remote web server.

Solution : remove it from /cgi-dos.

Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2003 Renaud Deraison

Cables, Connectors

SuperMicro AOC-LPZCR2 Rev 3.0 RAID Controller Card AS IS
$80.0
SuperMicro AOC-LPZCR2 Rev 3.0 RAID Controller Card AS IS pictureGenuine Dell PowerEdge 1950 Server Raid Controller Card DP/N: WX072, 0WX072 256M
$3.5
Genuine Dell PowerEdge 1950 Server Raid Controller Card DP/N: WX072, 0WX072 256M pictureIBM 42R5070 AS400 / AIX / Power, Raid Controller Cache Battery *NEW*
$79.0
IBM 42R5070 AS400 / AIX / Power, Raid Controller Cache Battery *NEW* pictureFujitsu LSI1064e Internal Raid Controller 0.1oz SAS/ SATA - Pci-E - D2507-D11
$3.76
Fujitsu LSI1064e Internal Raid Controller 0.1oz SAS/ SATA - Pci-E - D2507-D11 picture


Discussions

No Discussions have been posted on this vulnerability.