Nessus Plugin #10879

Plugin Index

Note: This file has been created from a downloaded version of the Nessus Plugins from http://www.nessus.org/. Therefore, the information here can be outdated.

Shell Command Execution Vulnerability

Family:
Gain a shell remotely
Category:
destructive_attack
Copyright:
This script is Copyright (C) 2001 SecurITeam
Summary:
Checks for the filtering of dangerous meta characters from network binded scripts
Version:
$Revision: 1.13 $
Cve_id:
-
Bugtraq_id:
-
Xrefs:
-
Description:

The remote port seems to be running some form of shell script,
with some provided user input. The input is not stripped for such meta
characters as ` ' | , etc. This would allow a remote attacker to
execute arbitrary code.

Solution : Make sure all meta characters are filtered out, or close the port
for access from untrusted networks

Risk factor : High
Generiert am 27.04.2005 um 18:49:54 Uhr.