Nessus Plugin #10879
Plugin Index
Note: This file has been created from a
downloaded version of the Nessus Plugins
from
http://www.nessus.org/.
Therefore, the information here can be outdated.
Shell Command Execution Vulnerability
- Family:
- Gain a shell remotely
- Category:
- destructive_attack
- Copyright:
- This script is Copyright (C) 2001 SecurITeam
- Summary:
- Checks for the filtering of dangerous meta characters from network binded scripts
- Version:
- $Revision: 1.13 $
- Cve_id:
- -
- Bugtraq_id:
- -
- Xrefs:
- -
- Description:
The remote port seems to be running some form of shell script,
with some provided user input. The input is not stripped for such meta
characters as ` ' | , etc. This would allow a remote attacker to
execute arbitrary code.
Solution : Make sure all meta characters are filtered out, or close the port
for access from untrusted networks
Risk factor : High
Generiert am 27.04.2005 um 18:49:54 Uhr.