Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

SCAN:MISC:HTTP:TEST-PROBE

Severity

Low

Recommended

No

Category

SCAN

Keywords

test-cgi Probe

Release Date

2003/04/22

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

SCAN: test-cgi Probe


This signature detects access to the test-cgi script, a common target of vulnerability scans.

Extended Description

NCSA HTTPd and comes with a CGI sample shell script, test-cgi, located by default in /cgi-bin. This script does not properly enclose an "ECHO" command in quotes, and as a result "shell expansion" of the * character can occur under some configurations. This allows a remote attacker to obtain file listings, by passing *, /*, /usr/* etc., as variables. The ECHO command expands the * to give a directory listing of the specified directory. This could be used to gain information to facilitate future attacks. This is identical to a problem with another sample script, nph-test-cgi. See references.

Affected Products

  • Apache Software Foundation Apache 0.8.11
  • Apache Software Foundation Apache 0.8.14
  • Apache Software Foundation Apache 1.0.0
  • Apache Software Foundation Apache 1.0.2
  • Apache Software Foundation Apache 1.0.3
  • Apache Software Foundation Apache 1.0.5
  • NCSA httpd 1.3.0
  • NCSA httpd 1.4.0
  • NCSA httpd 1.4.1
  • NCSA httpd 1.4.2
  • NCSA httpd 1.5.0 a-export
  • NCSA httpd 1.5.1
  • NCSA httpd 1.5.2
  • NCSA httpd 1.5.2 a

References

  • BugTraq: 2003
  • CVE: CVE-1999-0070

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out