Synopsis
The remote web server hosts an application that is affected by a remote code execution vulnerability.
Description
The version of EMail Security Virtual Appliance installed on the remote host is affected by a code execution vulnerability in the 'id' parameter of the 'learn-msg.cgi' script. By exploiting this flaw, a remote, unauthenticated attacker could execute arbitrary commands on the remote host subject to the privileges of the web server hosting the affected application.
Note the installed version is also likely affected by a similar vulnerability in the 'release-msg.cgi' script, though Nessus has not tested for this.
Solution
There is no known solution at this time.
Plugin Details
File Name: esva_learnmsg_rce.nasl
Supported Sensors: Nessus
Vulnerability Information
Required KB Items: www/esva
Excluded KB Items: Settings/disable_cgi_scanning
Exploit Ease: Exploits are available
Vulnerability Publication Date: 8/10/2012
Exploitable With
Metasploit (E-Mail Security Virtual Appliance learn-msg.cgi Command Injection)
Elliot (E-Mail Security Virtual Appliance 2.0.5 RCE)
Reference Information
BID: 55050