My Nessus scan showed these scripts as high-risk on tcp/2222, which is the DirectAdmin port. First off, where are these located, and secondly should I get rid of them or are they needed for DirectAdmin?
Nessus's info:
One or more copies of the 'cmd.asp' script were found, this ASP script can be used to execute commands over the web, on IIS 4.0 it executes with SYSTEM privileges.
Details:
cmd.asp - /scripts/cmdasp.asp
cmd.asp - /scripts/cmd.asp
cmd.asp - /scripts/shell.asp
cmd.asp - /scripts/own.asp
cmd.asp - /scripts/0wn.asp
cmd.asp - /scripts/exec.asp
cmd.asp - /scripts/x.asp
cmd.asp - /msadc/cmdasp.asp
cmd.asp - /msadc/cmd.asp
cmd.asp - /msadc/shell.asp
cmd.asp - /msadc/own.asp
cmd.asp - /msadc/0wn.asp
cmd.asp - /msadc/exec.asp
cmd.asp - /msadc/x.asp
Nessus's info:
One or more copies of the 'cmd.asp' script were found, this ASP script can be used to execute commands over the web, on IIS 4.0 it executes with SYSTEM privileges.
Details:
cmd.asp - /scripts/cmdasp.asp
cmd.asp - /scripts/cmd.asp
cmd.asp - /scripts/shell.asp
cmd.asp - /scripts/own.asp
cmd.asp - /scripts/0wn.asp
cmd.asp - /scripts/exec.asp
cmd.asp - /scripts/x.asp
cmd.asp - /msadc/cmdasp.asp
cmd.asp - /msadc/cmd.asp
cmd.asp - /msadc/shell.asp
cmd.asp - /msadc/own.asp
cmd.asp - /msadc/0wn.asp
cmd.asp - /msadc/exec.asp
cmd.asp - /msadc/x.asp