Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> /cgi-bin directory browsable ?


Vulnerability Assessment Details

/cgi-bin directory browsable ?

Vulnerability Assessment Summary
Is /cgi-bin browsable ?

Detailed Explanation for this Vulnerability Assessment

The /cgi-bin directory is browsable.
This will show you the name of the installed common scripts
and those which are written by the webmaster and thus may be
exploitable.

Solution : Make the /cgi-bin non-browsable.

Network Security Threat Level: Medium

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2000 Hendrik Scholz

Cables, Connectors

D‑Link DES-1024D Unmanaged Switch 24-Port
$7.23
D‑Link DES-1024D Unmanaged Switch 24-Port pictureUbiquiti Networks (ES-48-LITE) Rack-Mountable Network Device
$335.0
Ubiquiti Networks  (ES-48-LITE) Rack-Mountable Network Device pictureCisco IE-2000-8TC-G-B Industrial Ethernet Switch PoE LAN Base 90 days warranty
$400.0
Cisco IE-2000-8TC-G-B Industrial Ethernet Switch PoE LAN Base 90 days warranty pictureCisco WS-X4013 Catalyst 4000 Supervisor II Network Switch Module
$69.0
Cisco WS-X4013 Catalyst 4000 Supervisor II Network Switch Module picture


Discussions

No Discussions have been posted on this vulnerability.