I recently updated my plugin list.
Plugin ID:10610 had detected 471 instances of this particular exploit.
None of the systems I have checked, even have this cgi-bin software
installed.
I believe their is something wrong with this plugin check.

 script_id(10610);
 script_version ("$Revision: 1.11 $");
 script_cve_id("CAN-2001-0214");
 script_bugtraq_id(2370);

 name["english"] = "way-board";


 script_name(english:name["english"], francais:name["francais"]);

 desc["english"] = "The 'way-board' CGI is installed. This CGI has
a well known security flaw that lets an attacker read arbitrary
files with the privileges of the http daemon (usually root or nobody
).


I did a scan of a similar system that does not have way-point installed
and it still believed it was installed.

The logs on the scanned webserver show that it returned a 404 on all
attempted access for that file.  So it should not show that way-point is
installed.

_______________________________________________
Nessus mailing list
[EMAIL PROTECTED]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to