Lucene search

K
nessusThis script is Copyright (C) 1999-2022 Tenable Network Security, Inc.COLDFUSION.NASL
HistoryJul 09, 1999 - 12:00 a.m.

ColdFusion Multiple Vulnerabilities (File Upload/Manipulation)

1999-07-0900:00:00
This script is Copyright (C) 1999-2022 Tenable Network Security, Inc.
www.tenable.com
30

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.007 Low

EPSS

Percentile

80.2%

The ‘exprcalc.cfm’ page in the version of Cold Fusion Application Server running on the remote host allows an unauthenticated, remote attacker to read arbitrary files and possibly delete or upload arbitrary files as well.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(10001);
  script_version("1.50");
  script_set_attribute(attribute:"plugin_modification_date", value:"2022/04/11");

  script_cve_id("CVE-1999-0455", "CVE-1999-0477");
  script_bugtraq_id(115);

  script_name(english:"ColdFusion Multiple Vulnerabilities (File Upload/Manipulation)");

  script_set_attribute(attribute:"synopsis", value:
"The remote application server is affected by multiple vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"The 'exprcalc.cfm' page in the version of Cold Fusion Application
Server running on the remote host allows an unauthenticated, remote
attacker to read arbitrary files and possibly delete or upload
arbitrary files as well.");
  script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/1999/Apr/198");
  script_set_attribute(attribute:"solution", value:
"Contact the vendor for a patch.

In addition to this patch, it is recommended that the documentation
and example code not be stored on production servers.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:ND");

  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"1998/12/25");
  script_set_attribute(attribute:"patch_publication_date", value:"1999/02/04");
  script_set_attribute(attribute:"plugin_publication_date", value:"1999/07/09");

  script_set_attribute(attribute:"potential_vulnerability", value:"true");
  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:allaire:coldfusion_server");
  script_set_attribute(attribute:"thorough_tests", value:"true");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 1999-2022 Tenable Network Security, Inc.");

  script_dependencies("find_service1.nasl", "http_version.nasl");
  script_require_keys("Settings/ParanoidReport");
  script_require_ports("Services/www", 80);

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

if (report_paranoia < 2) audit(AUDIT_PARANOID);

#
# The script code starts here
#

port = get_http_port(default:80);

cgi  = "/cfdocs/expeval/ExprCalc.cfm?OpenFilePath=c:\winnt\win.ini";
cgi2 = "/cfdocs/expeval/ExprCalc.cfm?OpenFilePath=c:\windows\win.ini";
y = is_cgi_installed3(item:cgi, port:port);
if(!y){
	y = is_cgi_installed3(item:cgi2, port:port);
	cgi = cgi2;
	}


if(y){
        res = http_send_recv3(method:"GET", item:cgi, port:port);
  	if ( isnull(res) ) exit(0);
	if( "[fonts]" >< res )
		security_hole(port);
	}
VendorProductVersionCPE
allairecoldfusion_servercpe:/a:allaire:coldfusion_server

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.007 Low

EPSS

Percentile

80.2%

Related for COLDFUSION.NASL