Apache ASP module Apache::ASP source.asp Example File Arbitrary File Creation

high Nessus Plugin ID 10480

Synopsis

The remote web server is affected by an arbitrary file creation vulnerability.

Description

The file /site/eg/source.asp is present on the remote Apache web server.

This file comes with the Apache::ASP package and allows anyone to write to files in the same directory. An attacker may use this flaw to upload his own scripts and execute arbitrary commands on this host.

Solution

Upgrade to Apache::ASP 1.95 or newer.

See Also

https://seclists.org/bugtraq/2000/Jul/142

Plugin Details

Severity: High

ID: 10480

File Name: apache_source_asp.nasl

Version: 1.35

Type: remote

Family: Web Servers

Published: 7/23/2000

Updated: 11/15/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: High

Base Score: 7.3

Temporal Score: 6.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:joshua_chamas:apache_asp

Required KB Items: Settings/ParanoidReport, installed_sw/Apache

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 7/11/2000

Reference Information

CVE: CVE-2000-0628

BID: 1457