Short Name |
SCAN:MISC:HTTP:SENDMESSAGE |
---|---|
Severity |
Info |
Recommended |
No |
Category |
SCAN |
Keywords |
Sendmessage.cgi Access |
Release Date |
2003/04/22 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects access to the vulnerable sendmessage.cgi script. Attackers can execute arbitrary commands on the server.
W3Mail is a full featured open source web mail application implemented as a collection of Perl scripts that runs on Linux and Unix systems. It includes support for sending mail. When sending email, values passed as script parameters are used as part of a shell command. Shell meta characters are not properly filtered from this input. A maliciously formed URL submitted to the script could contain additional shell commands, which would then be executed by the web server user (generally 'nobody'). As a result, an attacker may execute arbitrary code on the vulnerable server. Earlier versions of W3Mail may also be vulnerable.