header-logo
Suggest Exploit
vendor:
BSCW
by:
SecurityFocus
7.5
CVSS
HIGH
Remote Command Execution
284
CWE
Product Name: BSCW
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows NT/2000, Unix variants
2002

BSCW Self-Registration Vulnerability

BSCW (Basic Support for Cooperative Work) is a web-based groupware application, allowing users to share a workspace via a web interface. It runs on Microsoft Windows NT/2000 systems, as well as a number of Unix variants. The default installation allows users to self-register, potentially allowing untrusted users to access the service. This may provide a window of opportunity for an untrusted, malicious user to access the service to exploit known issues. One example of an existing issue that may be exploited as a result of untrusted users being able to self-register is BugTraq ID 3776 'BSCW Remote Command Execution Vulnerability'.

Mitigation:

Restrict access to the BSCW service to trusted users only.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/3777/info

BSCW (Basic Support for Cooperative Work) is a web-based groupware application, allowing users to share a workspace via a web interface. It runs on Microsoft Windows NT/2000 systems, as well as a number of Unix variants.

The default installation allows users to self-register, potentially allowing untrusted users to access the service.

This may provide a window of opportunity for an untrusted, malicious user to access the service to exploit known issues. One example of an existing issue that may be exploited as a result of untrusted users being able to self-register is BugTraq ID 3776 "BSCW Remote Command Execution Vulnerability". 

http://your.bscwserver.url/pub/english.cgi?op=rmail