Lucene search

K
nessusThis script is Copyright (C) 2004-2020 and is owned by Tenable, Inc. or an Affiliate thereof.CHEROKEE_REMOTE_CMD.NASL
HistoryNov 04, 2004 - 12:00 a.m.

Cherokee Web Server Port Bind Privilege Drop Weakness

2004-11-0400:00:00
This script is Copyright (C) 2004-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
11

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.016

Percentile

87.5%

The remote host is running Cherokee - a fast and tiny web server.

The remote version of this software is vulnerable to remote command execution due to a lack of web requests sanitization, especially shell metacharacters.

Additionally, this version fails to drop root privileges after it binds to listen port.

A remote attacker may submit a specially crafted web request to execute arbitrary command on the server with root privileges.

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
 script_id(15622);
 script_version("1.17");

 script_cve_id("CVE-2001-1433");
 script_bugtraq_id(3771, 3773);

 script_name(english:"Cherokee Web Server Port Bind Privilege Drop Weakness");

 script_set_attribute(attribute:"synopsis", value:
"The remote web server is affected by a remote command execution
vulnerability." );
 script_set_attribute(attribute:"description", value:
"The remote host is running Cherokee - a fast and tiny web server.

The remote version of this software is vulnerable to remote
command execution due to a lack of web requests sanitization,
especially shell metacharacters.

Additionally, this version fails to drop root privileges after it 
binds to listen port.

A remote attacker may submit a specially crafted web request to 
execute arbitrary command on the server with root privileges." );
 # https://web.archive.org/web/20020426010020/http://archives.neohapsis.com/archives/vulnwatch/2001-q4/0085.html
 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?b7d15999" );
 script_set_attribute(attribute:"solution", value:
"Upgrade to Cherokee 0.2.7 or newer as this reportedly fixes the issue." );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

 script_set_attribute(attribute:"plugin_publication_date", value: "2004/11/04");
 script_set_attribute(attribute:"vuln_publication_date", value: "2001/12/30");
 script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/12");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();

 
 script_summary(english:"Checks for version of Cherokee");
 
 script_category(ACT_GATHER_INFO);
 
 script_copyright(english:"This script is Copyright (C) 2004-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
 script_family(english:"Web Servers");
 script_dependencie("find_service1.nasl", "http_version.nasl");
 script_require_ports("Services/www", 443);
 exit(0);
}

#
# The script code starts here
#
include("http_func.inc");

port = get_http_port(default:80, embedded:TRUE);
if(!get_port_state(port))exit(0);

banner = get_http_banner(port: port);
if(!banner)exit(0);
 
serv = strstr(banner, "Server");
if(ereg(pattern:"^Server:.*Cherokee/0\.([01]\.|2\.[0-6])[^0-9]", string:serv))
 {
   security_hole(port);
 }

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.016

Percentile

87.5%

Related for CHEROKEE_REMOTE_CMD.NASL