Short Name |
SCAN:MISC:HTTP:WEBCOM-EXE |
---|---|
Severity |
Info |
Recommended |
No |
Category |
SCAN |
Keywords |
Webcom CGI Guestbook Scripts |
Release Date |
2004/12/08 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to access the Webcom CGI Guestbook programs rguest.exe and wguest.exe. These programs contain multiple vulnerabilities that enable users to read arbitrary files on the web server.
The freeware guestbook package from freeware.webcom.se provides a web-based guestbook feature, using CGI. Some versions of this guestbook (undetermined at the time of writing) are vulnerable to an attack allowing an intruder to retrieve the contents of arbitrary files to which the web server has access. This can be accomplished by specifying the path and filename as the parameter "template" to either rguest.exe or wguest.exe - see Exploit for example. These two programs typically reside in /cgi-bin.