{"openvas": [{"lastseen": "2019-05-29T18:40:19", "bulletinFamily": "scanner", "description": "This host has ELOG installed and is prone multiple vulnerabilities.", "modified": "2019-03-07T00:00:00", "published": "2009-08-26T00:00:00", "id": "OPENVAS:1361412562310901009", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310901009", "title": "ELOG Remote Buffer Overflow and Cross Site Scripting Vulnerabilities", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: secpod_elog_mult_vuln.nasl 14031 2019-03-07 10:47:29Z cfischer $\n#\n# ELOG Remote Buffer Overflow and Cross Site Scripting Vulnerabilities\n#\n# Authors:\n# Antu Sanadi <santu@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2009 SecPod, http://www.secpod.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:stefan_ritt:elog_web_logbook\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.901009\");\n script_version(\"$Revision: 14031 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-07 11:47:29 +0100 (Thu, 07 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2009-08-26 14:01:08 +0200 (Wed, 26 Aug 2009)\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cve_id(\"CVE-2008-7004\", \"CVE-2008-0444\", \"CVE-2008-0445\");\n script_bugtraq_id(27399);\n script_name(\"ELOG Remote Buffer Overflow and Cross Site Scripting Vulnerabilities\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 SecPod\");\n script_family(\"Buffer overflow\");\n script_dependencies(\"secpod_elog_detect.nasl\");\n script_mandatory_keys(\"ELOG/detected\");\n\n script_xref(name:\"URL\", value:\"http://xforce.iss.net/xforce/xfdb/39903\");\n script_xref(name:\"URL\", value:\"https://midas.psi.ch/elog/download/ChangeLog\");\n script_xref(name:\"URL\", value:\"http://www.vupen.com/english/advisories/2008/0265\");\n script_xref(name:\"URL\", value:\"https://midas.psi.ch/elog/download/\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attackers to execute arbitrary scripting\n code, cause a denial of service or compromise a vulnerable system.\");\n\n script_tag(name:\"affected\", value:\"ELOG versions prior to 2.7.1.\");\n\n script_tag(name:\"insight\", value:\"The flaws are due to:\n\n - A buffer overflow error in 'elog.c' when processing malformed data.\n\n - An infinite loop in the 'replace_inline_img()' [elogd.c] function.\n\n - An input validation error when handling the 'subtext' parameter.\");\n\n script_tag(name:\"solution\", value:\"Upgrade ELOG Version to 2.7.1. Please see the\n references for more info.\");\n\n script_tag(name:\"summary\", value:\"This host has ELOG installed and is prone multiple vulnerabilities.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"remote_banner\");\n\n exit(0);\n}\n\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nif( ! port = get_app_port( cpe:CPE ) )\n exit( 0 );\n\nif( ! vers = get_app_version( cpe:CPE, port:port ) )\n exit( 0 );\n\n# nb: 2.7.1 => 2.7.1.2002\nif( version_is_less( version:vers, test_version:\"2.7.1.2002\" ) ){\n report = report_fixed_ver( installed_version:vers, fixed_version:\"2.7.1\" );\n security_message( port:port, data:report );\n exit( 0 );\n}\n\nexit( 99 );", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2017-07-02T21:13:50", "bulletinFamily": "scanner", "description": "This host has ELOG installed and is prone multiple vulnerabilities.", "modified": "2017-01-20T00:00:00", "published": "2009-08-26T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=901009", "id": "OPENVAS:901009", "title": "ELOG Remote Buffer Overflow and Cross Site Scripting Vulnerabilities", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: secpod_elog_mult_vuln.nasl 5055 2017-01-20 14:08:39Z teissa $\n#\n# ELOG Remote Buffer Overflow and Cross Site Scripting Vulnerabilities\n#\n# Authors:\n# Antu Sanadi <santu@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2009 SecPod, http://www.secpod.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation will allow attackers to execute arbitrary scripting\n code, cause a denial of service or compromise a vulnerable system.\n Impact Level: System/Application\";\ntag_affected = \"ELOG versions prior to 2.7.1\";\ntag_insight = \"The flaws are due to:\n - A buffer overflow error in 'elog.c' when processing malformed data.\n - An infinite loop in the 'replace_inline_img()' [elogd.c] function.\n - An input validation error when handling the 'subtext' parameter.\";\ntag_solution = \"Upgrade ELOG Version to 2.7.1\n For updates refer to https://midas.psi.ch/elog/download/\";\ntag_summary = \"This host has ELOG installed and is prone multiple vulnerabilities.\";\n\nif(description)\n{\n script_id(901009);\n script_version(\"$Revision: 5055 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-01-20 15:08:39 +0100 (Fri, 20 Jan 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-08-26 14:01:08 +0200 (Wed, 26 Aug 2009)\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cve_id(\"CVE-2008-7004\", \"CVE-2008-0444\", \"CVE-2008-0445\");\n script_bugtraq_id(27399);\n script_name(\"ELOG Remote Buffer Overflow and Cross Site Scripting Vulnerabilities\");\n script_xref(name : \"URL\" , value : \"http://xforce.iss.net/xforce/xfdb/39903\");\n script_xref(name : \"URL\" , value : \"https://midas.psi.ch/elog/download/ChangeLog\");\n script_xref(name : \"URL\" , value : \"http://www.vupen.com/english/advisories/2008/0265\");\n\n script_tag(name:\"qod_type\", value:\"remote_banner\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 SecPod\");\n script_family(\"Buffer overflow\");\n script_dependencies(\"secpod_elog_detect.nasl\");\n script_require_ports(\"Services/www\", 8080);\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n exit(0);\n}\n\n\ninclude(\"http_func.inc\");\ninclude(\"version_func.inc\");\n\nelogPort = get_http_port(default:8080);\nif(!elogPort){\n exit(0);\n}\n\nelogVer = get_kb_item(\"www/\" + elogPort + \"/ELOG\");\nif(elogVer != NULL)\n{\n # Check for ELOG versions prior to 2.7.1 => 2.7.1.2002\n if(version_is_less(version:elogVer, test_version:\"2.7.1.2002\")){\n security_message(elogPort);\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}]}