HTTP: nph-test-cgi Directory Listing

This signature detects attempts to exploit a known vulnerability in the nph-test-cgi script included with some HTTP daemons. Unauthorized Web client users can access confidential files.

Extended Description

Description as given by Josh Richards: A security hole exists in the nph-test-cgi script included in most UNIX based World Wide Web daemon distributions. The nph-* scripts exist to allow 'non-parsed headers' to be sent via the HTTP protocol (this is not the cause of this security problem, though). The problem is that nph-test-cgi, which prints out information on the current web environment (just like 'test-cgi' does) does not enclose its arguments to the 'echo' command inside of quotes....shell escapes are not possible (or at least I have not found them to be--yet) but shell *expansion* is.... This means that _any_ remote user can easily browse your filesystem via the WWW. This is a bug with the nph-test-cgi script and _not_ the server itself.

Affected Products

Ncsa httpd

Short Name
HTTP:NCSA:NPH-TEST-CGI
Severity
Minor
Recommended
False
Recommended Action
None
Category
HTTP
Keywords
CVE-1999-0045 Directory Listing bid:686 nph-test-cgi
Release Date
04/22/2003
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Apache_software_foundation

Ncsa

Netscape

CVSS Score

7.5

Found a potential security threat?