Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

SCAN:MISC:HTTP:WEBCOM-EXE

Severity

Info

Recommended

No

Category

SCAN

Keywords

Webcom CGI Guestbook Scripts

Release Date

2004/12/08

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

SCAN: Webcom CGI Guestbook Scripts


This signature detects attempts to access the Webcom CGI Guestbook programs rguest.exe and wguest.exe. These programs contain multiple vulnerabilities that enable users to read arbitrary files on the web server.

Extended Description

The freeware guestbook package from freeware.webcom.se provides a web-based guestbook feature, using CGI. Some versions of this guestbook (undetermined at the time of writing) are vulnerable to an attack allowing an intruder to retrieve the contents of arbitrary files to which the web server has access. This can be accomplished by specifying the path and filename as the parameter "template" to either rguest.exe or wguest.exe - see Exploit for example. These two programs typically reside in /cgi-bin.

Affected Products

  • Webcom_datakommunikation guestbook 0.1.0

References

  • BugTraq: 2024
  • CVE: CVE-1999-0467
  • URL: http://www.securityfocus.com/archive/1/13213

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out