Language:
Severity: Critical
ID: 57578
File Name: op5_config_command_execution.nasl
Version: 1.20
Type: remote
Family: CGI abuses
Published: 1/17/2012
Updated: 1/19/2021
Supported Sensors: Nessus
Risk Factor: High
Score: 7.4
Risk Factor: Critical
Base Score: 10
Temporal Score: 8.3
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE: cpe:/a:op5:system-op5config
Required KB Items: www/op5_portal
Excluded KB Items: Settings/disable_cgi_scanning
Exploit Ease: No exploit is required
Exploited by Nessus: true
Patch Publication Date: 12/29/2011
Vulnerability Publication Date: 12/29/2011
Metasploit (OP5 welcome Remote Command Execution)
Elliot (OP5 Monitor 5.5 RCE)
CVE: CVE-2012-0262
BID: 51212