# # This script was written by Michel Arboi # # Script audit and contributions from Carmichael Security # Erik Anderson # Added CAN. Added link to the Bugtraq message archive # # GPL # # References: # From: joetesta@hushmail.com # To: bugtraq@securityfocus.com, jscimone@cc.gatech.edu # Subject: Vulnerabilities in PGPMail.pl # Date: Thu, 29 Nov 2001 19:45:38 -0800 # # John Scimone . # # if(description) { script_id(11070); script_version ("$Revision$"); script_cve_id("CAN-2001-0937"); name["english"] = "PGPMail.pl detection"; script_name(english:name["english"]); desc["english"] = "The 'PGPMail.pl' CGI is installed. Some versions (up to v1.31 a least) of this CGI do not properly filter user input before using it inside commands. This would allow a cracker to run any command on your server. *** Note: Nessus just checked the presence of this CGI *** but did not try to exploit the flaws. Solution : remove it from /cgi-bin or upgrade it. Reference : http://online.securityfocus.com/archive/82/243262 Reference : http://online.securityfocus.com/archive/1/243408 Risk factor : High"; script_description(english:desc["english"]); summary["english"] = "Checks for the presence of PGPMail.pl"; script_summary(english:summary["english"]); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2002 Michel Arboi"); family["english"] = "CGI abuses"; script_family(english:family["english"]); script_dependencie("find_service.nes", "no404.nasl", "httpver.nasl"); script_require_ports("Services/www", 80); exit(0); } # port = is_cgi_installed("PGPMail.pl"); if(port) security_warning(port);