HTTP: test.cgi Files Listing

This signature detects attempts to access the script test.cgi. Attackers can use script to obtain file listings on the server.

Extended Description

NCSA HTTPd and comes with a CGI sample shell script, test-cgi, located by default in /cgi-bin. This script does not properly enclose an "ECHO" command in quotes, and as a result "shell expansion" of the * character can occur under some configurations. This allows a remote attacker to obtain file listings, by passing *, /*, /usr/* etc., as variables. The ECHO command expands the * to give a directory listing of the specified directory. This could be used to gain information to facilitate future attacks. This is identical to a problem with another sample script, nph-test-cgi. See references.

Affected Products

Ncsa httpd

References

BugTraq: 2003

CVE: CVE-1999-0070

Short Name
HTTP:CGI:TEST-CGI
Severity
Warning
Recommended
False
Recommended Action
None
Category
HTTP
Keywords
CVE-1999-0070 Files Listing bid:2003 test.cgi
Release Date
12/08/2004
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3725
False Positive
Unknown
Vendors

Apache_software_foundation

Ncsa

CVSS Score

5.0

Found a potential security threat?