ID DEBIAN_DSA-125.NASL Type nessus Reporter This script is Copyright (C) 2004-2021 Tenable Network Security, Inc. Modified 2004-09-29T00:00:00
Description
Yuji Takahashi discovered a bug in analog which allows a cross-site
scripting type attack. It is easy for an attacker to insert arbitrary
strings into any web server logfile. If these strings are then
analysed by analog, they can appear in the report. By this means an
attacker can introduce arbitrary JavaScript code, for example, into an
analog report produced by someone else and read by a third person.
Analog already attempted to encode unsafe characters to avoid this
type of attack, but the conversion was incomplete.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Debian Security Advisory DSA-125. The text
# itself is copyright (C) Software in the Public Interest, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(14962);
script_version("1.20");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/04");
script_cve_id("CVE-2002-0166");
script_bugtraq_id(4389);
script_xref(name:"DSA", value:"125");
script_name(english:"Debian DSA-125-1 : analog - XSS ");
script_summary(english:"Checks dpkg output for the updated package");
script_set_attribute(
attribute:"synopsis",
value:"The remote Debian host is missing a security-related update."
);
script_set_attribute(
attribute:"description",
value:
"Yuji Takahashi discovered a bug in analog which allows a cross-site
scripting type attack. It is easy for an attacker to insert arbitrary
strings into any web server logfile. If these strings are then
analysed by analog, they can appear in the report. By this means an
attacker can introduce arbitrary JavaScript code, for example, into an
analog report produced by someone else and read by a third person.
Analog already attempted to encode unsafe characters to avoid this
type of attack, but the conversion was incomplete."
);
script_set_attribute(
attribute:"see_also",
value:"http://www.debian.org/security/2002/dsa-125"
);
script_set_attribute(
attribute:"solution",
value:
"Upgrade the analog package immediately.
This problem has been fixed in the upstream version 5.22 of analog.
Unfortunately patching the old version of analog in the stable
distribution of Debian instead is a very large job that defeats us."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:analog");
script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:2.2");
script_set_attribute(attribute:"patch_publication_date", value:"2002/03/28");
script_set_attribute(attribute:"plugin_publication_date", value:"2004/09/29");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2004-2021 Tenable Network Security, Inc.");
script_family(english:"Debian Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
exit(0);
}
include("audit.inc");
include("debian_package.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
flag = 0;
if (deb_check(release:"2.2", prefix:"analog", reference:"5.22-0potato1")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());
else security_hole(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
{"id": "DEBIAN_DSA-125.NASL", "bulletinFamily": "scanner", "title": "Debian DSA-125-1 : analog - XSS ", "description": "Yuji Takahashi discovered a bug in analog which allows a cross-site\nscripting type attack. It is easy for an attacker to insert arbitrary\nstrings into any web server logfile. If these strings are then\nanalysed by analog, they can appear in the report. By this means an\nattacker can introduce arbitrary JavaScript code, for example, into an\nanalog report produced by someone else and read by a third person.\nAnalog already attempted to encode unsafe characters to avoid this\ntype of attack, but the conversion was incomplete.", "published": "2004-09-29T00:00:00", "modified": "2004-09-29T00:00:00", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "href": "https://www.tenable.com/plugins/nessus/14962", "reporter": "This script is Copyright (C) 2004-2021 Tenable Network Security, Inc.", "references": ["http://www.debian.org/security/2002/dsa-125"], "cvelist": ["CVE-2002-0166"], "type": "nessus", "lastseen": "2021-01-06T09:44:45", "edition": 24, "viewCount": 1, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2002-0166"]}, {"type": "openvas", "idList": ["OPENVAS:53578"]}, {"type": "osvdb", "idList": ["OSVDB:2059"]}], "modified": "2021-01-06T09:44:45", "rev": 2}, "score": {"value": 4.5, "vector": "NONE", "modified": "2021-01-06T09:44:45", "rev": 2}, "vulnersScore": 4.5}, "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-125. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(14962);\n script_version(\"1.20\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2002-0166\");\n script_bugtraq_id(4389);\n script_xref(name:\"DSA\", value:\"125\");\n\n script_name(english:\"Debian DSA-125-1 : analog - XSS \");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Yuji Takahashi discovered a bug in analog which allows a cross-site\nscripting type attack. It is easy for an attacker to insert arbitrary\nstrings into any web server logfile. If these strings are then\nanalysed by analog, they can appear in the report. By this means an\nattacker can introduce arbitrary JavaScript code, for example, into an\nanalog report produced by someone else and read by a third person.\nAnalog already attempted to encode unsafe characters to avoid this\ntype of attack, but the conversion was incomplete.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.debian.org/security/2002/dsa-125\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the analog package immediately.\n\nThis problem has been fixed in the upstream version 5.22 of analog.\nUnfortunately patching the old version of analog in the stable\ndistribution of Debian instead is a very large job that defeats us.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:analog\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:2.2\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2002/03/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2004/09/29\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2004-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"2.2\", prefix:\"analog\", reference:\"5.22-0potato1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "naslFamily": "Debian Local Security Checks", "pluginID": "14962", "cpe": ["p-cpe:/a:debian:debian_linux:analog", "cpe:/o:debian:debian_linux:2.2"], "scheme": null}
{"cve": [{"lastseen": "2020-10-03T11:36:59", "description": "Cross-site scripting vulnerability in analog before 5.22 allows remote attackers to execute Javascript via an HTTP request containing the script, which is entered into a web logfile and not properly filtered by analog during display.", "edition": 4, "cvss3": {}, "published": "2002-04-22T04:00:00", "title": "CVE-2002-0166", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": true, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2002-0166"], "modified": "2008-09-11T00:00:00", "cpe": ["cpe:/a:stephen_turner:analog:4.91_beta1", "cpe:/a:stephen_turner:analog:4.11", "cpe:/a:stephen_turner:analog:3.90_beta1", "cpe:/a:stephen_turner:analog:5.01", "cpe:/a:stephen_turner:analog:4.1", "cpe:/a:stephen_turner:analog:4.02", "cpe:/a:stephen_turner:analog:4.90_beta2", "cpe:/a:stephen_turner:analog:4.16", "cpe:/a:stephen_turner:analog:4.14", "cpe:/a:stephen_turner:analog:5.0", "cpe:/a:stephen_turner:analog:4.90_beta3", "cpe:/a:stephen_turner:analog:5.1a", "cpe:/a:stephen_turner:analog:4.03", "cpe:/a:stephen_turner:analog:4.04", "cpe:/a:stephen_turner:analog:5.03", "cpe:/a:stephen_turner:analog:3.90_beta2", "cpe:/a:stephen_turner:analog:4.90_beta4", "cpe:/a:stephen_turner:analog:5.2", "cpe:/a:stephen_turner:analog:4.01", "cpe:/a:stephen_turner:analog:5.02", "cpe:/a:stephen_turner:analog:4.15"], "id": "CVE-2002-0166", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-0166", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:stephen_turner:analog:4.04:*:*:*:*:*:*:*", "cpe:2.3:a:stephen_turner:analog:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:stephen_turner:analog:4.14:*:*:*:*:*:*:*", "cpe:2.3:a:stephen_turner:analog:3.90_beta1:*:*:*:*:*:*:*", "cpe:2.3:a:stephen_turner:analog:4.01:*:*:*:*:*:*:*", "cpe:2.3:a:stephen_turner:analog:4.90_beta2:*:*:*:*:*:*:*", "cpe:2.3:a:stephen_turner:analog:4.90_beta4:*:*:*:*:*:*:*", "cpe:2.3:a:stephen_turner:analog:5.01:*:*:*:*:*:*:*", "cpe:2.3:a:stephen_turner:analog:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:stephen_turner:analog:4.03:*:*:*:*:*:*:*", "cpe:2.3:a:stephen_turner:analog:5.03:*:*:*:*:*:*:*", "cpe:2.3:a:stephen_turner:analog:4.91_beta1:*:*:*:*:*:*:*", "cpe:2.3:a:stephen_turner:analog:4.11:*:*:*:*:*:*:*", "cpe:2.3:a:stephen_turner:analog:4.02:*:*:*:*:*:*:*", "cpe:2.3:a:stephen_turner:analog:4.90_beta3:*:*:*:*:*:*:*", "cpe:2.3:a:stephen_turner:analog:3.90_beta2:*:*:*:*:*:*:*", "cpe:2.3:a:stephen_turner:analog:5.02:*:*:*:*:*:*:*", "cpe:2.3:a:stephen_turner:analog:4.16:*:*:*:*:*:*:*", "cpe:2.3:a:stephen_turner:analog:5.2:*:*:*:*:*:*:*", "cpe:2.3:a:stephen_turner:analog:4.15:*:*:*:*:*:*:*", "cpe:2.3:a:stephen_turner:analog:5.1a:*:*:*:*:*:*:*"]}], "openvas": [{"lastseen": "2017-07-24T12:50:24", "bulletinFamily": "scanner", "cvelist": ["CVE-2002-0166"], "description": "The remote host is missing an update to analog\nannounced via advisory DSA 125-1.", "modified": "2017-07-07T00:00:00", "published": "2008-01-17T00:00:00", "id": "OPENVAS:53578", "href": "http://plugins.openvas.org/nasl.php?oid=53578", "type": "openvas", "title": "Debian Security Advisory DSA 125-1 (analog)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_125_1.nasl 6616 2017-07-07 12:10:49Z cfischer $\n# Description: Auto-generated from advisory DSA 125-1\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largerly excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Yuji Takahashi discovered a bug in analog which allows a cross-site\nscripting type attack. It is easy for an attacker to insert arbitrary\nstrings into any web server logfile. If these strings are then\nanalysed by analog, they can appear in the report. By this means an\nattacker can introduce arbitrary Javascript code, for example, into an\nanalog report produced by someone else and read by a third person.\nAnalog already attempted to encode unsafe characters to avoid this\ntype of attack, but the conversion was incomplete.\n\nThis problem has been fixed in the upstream version 5.22 of analog.\nUnfortunately patching the old version of analog in the stable\ndistribution of Debian instead is a very large job that defeats us.\n\nWe recommend that you upgrade your analog package immediately.\";\ntag_summary = \"The remote host is missing an update to analog\nannounced via advisory DSA 125-1.\";\n\ntag_solution = \"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20125-1\";\n\nif(description)\n{\n script_id(53578);\n script_cve_id(\"CVE-2002-0166\");\n script_version(\"$Revision: 6616 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-01-17 22:24:46 +0100 (Thu, 17 Jan 2008)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"Debian Security Advisory DSA 125-1 (analog)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"analog\", ver:\"5.22-0potato1\", rls:\"DEB2.2\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "osvdb": [{"lastseen": "2017-04-28T13:19:56", "bulletinFamily": "software", "cvelist": ["CVE-2002-0166"], "edition": 1, "description": "## Vulnerability Description\nAnalog contains a flaw that allows a remote cross site scripting attack. \nThis flaw exists because the application does not validate log entries during analyzing. This could allow an attacker to create a specially crafted URL that would execute arbitrary code on the machine analyzing the logs.\n\n## Solution Description\nUpgrade to version 5.22 or higher, as it has been reported to fix this \nvulnerability. An upgrade is required as there are no known workarounds.\n## Short Description\nAnalog contains a flaw that allows a remote cross site scripting attack. \nThis flaw exists because the application does not validate log entries during analyzing. This could allow an attacker to create a specially crafted URL that would execute arbitrary code on the machine analyzing the logs.\n\n## References:\n[Vendor Specific Advisory URL](http://www.analog.cx/security4.html)\nISS X-Force ID: 8656\n[CVE-2002-0166](https://vulners.com/cve/CVE-2002-0166)\nBugtraq ID: 4389\n", "modified": "2002-03-22T00:00:00", "published": "2002-03-22T00:00:00", "href": "https://vulners.com/osvdb/OSVDB:2059", "id": "OSVDB:2059", "type": "osvdb", "title": "Analog Logfile Analysis XSS", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}]}