Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> inserter.cgi File Inclusion and Command Execution Vulnerabilities


Vulnerability Assessment Details

inserter.cgi File Inclusion and Command Execution Vulnerabilities

Vulnerability Assessment Summary
Searches for the existence of a file inclusion vulnerability

Detailed Explanation for this Vulnerability Assessment

The remote web server contains the 'inserter' CGI.

The inserter.cgi contains a vulnerability that permits remote attackers to cause
the CGI to execute arbitrary commands with the rights of the web server
by supplying it with a piped instruction or to include arbitrary files by
providing an absolute path to the location of the file.

Solution : Delete this file
Risk factor: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Noam Rathaus

Cables, Connectors

Opolar LC05 Laptop Cooler with Vacuum Fan (Rapid Cooling, Auto-Temp Detection,
$31.91
 Opolar LC05 Laptop Cooler with Vacuum Fan (Rapid Cooling, Auto-Temp Detection, pictureMini Computer Vacuum USB Keyboard Cleaner PC Laptop Brush Dust Cleaning Kit Hot
$0.01
Mini Computer Vacuum USB Keyboard Cleaner PC Laptop Brush Dust Cleaning Kit Hot pictureMini Vacuum USB Laptop Cooler Air Extracting Exhaust Cooling Fan CPU Cooler BE
$5.75
Mini Vacuum USB Laptop Cooler Air Extracting Exhaust Cooling Fan CPU Cooler BE pictureMini Vacuum USB Laptop Cooler Air Extracting Exhaust Cooling Fan CPU Cooler BE
$5.75
Mini Vacuum USB Laptop Cooler Air Extracting Exhaust Cooling Fan CPU Cooler BE picture


Discussions

No Discussions have been posted on this vulnerability.