webagogo

Hi I just did a webagogo report on my website and in Secuitry it came up with some (what sounds like serious) errors ...

Possible access to server using cgi phf exploit
Count.cgi found on this server, please run following command (/cgi-bin/Count.cgi?display=version) and verify if Count.cgi version >= 2.5
test-cgi found on this server, please check your test-cgi file for -> echo QUERY_STRING = $QUERY_STRING <-, if it is in there then replace this line with echo QUERY_STRING = "$QUERY_STRING"
websendmail has been found in the cgi-bin, this program has been known to make your server vulnerable, it is best that you remove this program from the cgi-bin.
pfdisplay.cgi seems to be installed on your server, this script might make your server vulnerable. Known systems to be vulnerable: Silicon Graphics IRIX 6.2, 6.4 and 6.3
wwwboard.pl has been found in the servers cgi-bin directory, this script might make your server vulnerable, check if your script has been patched.
nph-test-cgi found on this server, either remove this script or check your nph-test-cgi file for -> echo QUERY_STRING = $QUERY_STRING <-, if it is in there then replace this line with echo QUERY_STRING = "$QUERY_STRING"
The file /cgi-bin/campas can be used to remotely view any file your web server has permissions to view, if you don't use this script it is recomended to remove this file from your server.

In my domain tool I have bgi_dir disabled ... how come I seem to have a vulnerability?
 
Back
Top