Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> webspirs.cgi


Vulnerability Assessment Details

webspirs.cgi

Vulnerability Assessment Summary
Searches for the existence of webspirs.cgi

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote web server contains a CGI script that is prone to
information disclosure.

Description :

The remote host is running WebSPIRS, SilverPlatter's Information
Retrieval System for the World Wide Web.

The installed version of WebSPIRS has a well documented security flaw that
lets a possible hacker read arbitrary files with the rights of the http
daemon (usually root or nobody).

See also :

http://archives.neohapsis.com/archives/bugtraq/2001-02/0217.html

Solution :

Remove this CGI script.

Network Security Threat Level:

Medium / CVSS Base Score : 4
(AV:R/AC:L/Au:NR/C:P/A:N/I:N/B:C)

Networks Security ID: 2362

Vulnerability Assessment Copyright: This script is Copyright (C) 2001 Laurent Kitzinger

Cables, Connectors

Dell Latitude E6430 w/ Core i5 2.6ghz 4gb Ram No HD, DVD-RW, See Des
$39.99
Dell Latitude E6430 w/ Core i5 2.6ghz 4gb Ram No HD, DVD-RW, See Des pictureCrucial 4GBx8 (32GB) ECC UDIMM DDR3 1333 PC3 10600 for Server or Mac Pro
$100.0
Crucial 4GBx8 (32GB) ECC UDIMM DDR3 1333 PC3 10600 for Server or Mac Pro pictureLenovo Android Tablet Tab 2 A7-20F 4 Core, 1.3 GHz, 1 GB RAM, 16 GB Storage MORE
$59.95
Lenovo Android Tablet Tab 2 A7-20F 4 Core, 1.3 GHz, 1 GB RAM, 16 GB Storage MORE pictureNEW RASPBERRY PI 2 Model B 1GB RAM by Element 14
$28.0
NEW RASPBERRY PI 2 Model B 1GB RAM by Element 14  picture


Discussions

No Discussions have been posted on this vulnerability.