Lucene search

K
nessusThis script is Copyright (C) 2002-2021 and is owned by Tenable, Inc. or an Affiliate thereof.ACHIEVO_CODE_INJECTION.NASL
HistoryAug 22, 2002 - 12:00 a.m.

Achievo class.atkdateattribute.js.php config_atkroot Parameter Remote File Inclusion

2002-08-2200:00:00
This script is Copyright (C) 2002-2021 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
31

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.078

Percentile

94.2%

The remote host is running Achievo, a web-based resource management tool written in PHP.

The version of Achievo on the remote host includes a PHP script which is reported to be affected by a remote file include vulnerability. An attacker may use this flaw to inject arbitrary code in the remote host and gain a shell with the privileges of the web server. Note that this flaw is only present if PHP register_globals is set to ‘on’. The attacker must also be able to store the attack code on a server that is accessible by the web server.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

# Script audit and contributions from Carmichael Security
#      Erik Anderson <[email protected]>
#      Added BugtraqID
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if(description)
{
  script_id(11109);
  script_cve_id("CVE-2002-1435");
  script_bugtraq_id(5552);
  script_version("1.32");

  script_name(english:"Achievo class.atkdateattribute.js.php config_atkroot Parameter Remote File Inclusion");
  script_summary(english:"Checks for the presence of Achievo");
  script_set_attribute(attribute:"synopsis", value:
"The remote host contains a resource management tool which is
affected by a remote file inclusion vulnerability." );
  script_set_attribute(attribute:"description", value:
"The remote host is running Achievo, a web-based resource management
tool written in PHP.

The version of Achievo on the remote host includes a PHP script which
is reported to be affected by a remote file include vulnerability. 
An attacker may use this flaw to inject arbitrary code in the remote
host and gain a shell with the privileges of the web server. Note that
this flaw is only present if PHP register_globals is set to 'on'. The
attacker must also be able to store the attack code on a server that
is accessible by the web server." );

  script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2002/Aug/330");
  script_set_attribute(attribute:"solution", value:
"Upgrading to Achievo 1.2 or newer reportedly fixes this problem." );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2002-1435");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"plugin_publication_date", value: "2002/08/22");
  script_set_attribute(attribute:"vuln_publication_date", value: "2002/08/22");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");
  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_end_attributes();
 
  script_category(ACT_ATTACK);
  script_copyright(english:"This script is Copyright (C) 2002-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_family(english:"CGI abuses");
  
  script_dependencie("find_service1.nasl", "http_version.nasl");
  script_require_ports("Services/www", 80);
  script_exclude_keys("Settings/disable_cgi_scanning");
  script_require_keys("www/PHP");
  exit(0);
}

#
# The script code starts here
#
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");


port = get_http_port(default:80);

if(!can_host_php(port:port)) exit(0);



tmp = cgi_dirs();
dir = NULL;
foreach d (tmp)
{
 if(isnull(dir))dir = make_list(d, string(d, "/achievo"));
 else dir = make_list(dir, d, string(d, "/achievo"));
}


for(i = 0; dir[i] ; i = i +  1)
 {
  w = http_send_recv3(method:"GET", item:string(dir[i], "//atk/javascript/class.atkdateattribute.js.php?config_atkroot=http://example.com/"),
 		port:port);
 if (isnull(w)) exit(0);
 r = strcat(w[0], w[1], '\r\n', w[2]);
 if("http://example.com/atk/" >< r)
  {
 	security_warning(port);
	exit(0);
  }
}

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.078

Percentile

94.2%

Related for ACHIEVO_CODE_INJECTION.NASL