📄 cgiwrap.nasl
字号:
## This script was written by Mathieu Perrin <mathieu@tpfh.org>## See the Nessus Scripts License for details#if(description){ script_id(10041); script_bugtraq_id(1238, 777); script_version ("$Revision: 38 $"); script_cve_id("CVE-1999-1530", "CVE-2000-0431"); name["english"] = "Cobalt RaQ2 cgiwrap"; name["francais"] = "Cobalt RaQ2 cgiwrap"; script_name(english:name["english"], francais:name["francais"]); desc["english"] = "'cgiwrap' is installed. If you are running an unpatched Cobalt RaQ, the version of cgiwrap distributed with that system has a knownsecurity flaw that lets anyone execute arbitrarycommands with the privileges of the http daemon (root or nobody).This flaw exists only on the Cobalt modified cgiwrap. Standard buildsof cgiwrap are not affected.Solution : upgrade your Cobalt RaQ to apply fixRisk factor : Medium"; script_description(english:desc["english"]); summary["english"] = "Checks for the presence of /cgi-bin/cgiwrap"; summary["francais"] = "V閞ifie la pr閟ence de /cgi-bin/cgiwrap"; script_summary(english:summary["english"], francais:summary["francais"]); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 1999 Mathieu Perrin", francais:"Ce script est Copyright (C) 1999 Mathieu Perrin"); family["english"] = "CGI abuses"; family["francais"] = "Abus de CGI"; script_family(english:family["english"], francais:family["francais"]); script_dependencie("http_version.nasl"); script_require_ports("Services/www", 80); exit(0);} ## The script code starts here#include("http_func.inc");include("http_keepalive.inc");include("global_settings.inc");if ( report_paranoia < 2 ) exit(0);port = get_http_port(default:80);res = is_cgi_installed_ka(item:"cgiwrap", port:port);if(res)security_warning(port);
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -