Lucene search

K
nessusThis script is Copyright (C) 2003-2022 and is owned by Tenable, Inc. or an Affiliate thereof.GALLERY_INJECTION2.NASL
HistoryOct 11, 2003 - 12:00 a.m.

Gallery index.php GALLERY_BASEDIR Parameter Remote File Inclusion

2003-10-1100:00:00
This script is Copyright (C) 2003-2022 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
15

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.022

Percentile

89.4%

The version of Gallery hosted on the remote web server is affected by a remote file inclusion vulnerability due to the application failing to properly sanitize user-supplied input to the ‘GALLERY_BASEDIR’ parameter of the ‘index.php’ script. An attacker may use this flaw to inject arbitrary code in the remote host and gain a shell with the privileges of the web server user.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(11876);
  script_version("1.31");
  script_set_attribute(attribute:"plugin_modification_date", value:"2022/04/11");

  script_cve_id("CVE-2003-1227");
  script_bugtraq_id(8814);

  script_name(english:"Gallery index.php GALLERY_BASEDIR Parameter Remote File Inclusion");

  script_set_attribute(attribute:"synopsis", value:
"The remote web server is running a PHP application that is affected by
a remote file inclusion vulnerability.");
  script_set_attribute(attribute:"description", value:
"The version of Gallery hosted on the remote web server is affected by a
remote file inclusion vulnerability due to the application failing to
properly sanitize user-supplied input to the 'GALLERY_BASEDIR' parameter
of the 'index.php' script.  An attacker may use this flaw to inject
arbitrary code in the remote host and gain a shell with the privileges
of the web server user.");
  script_set_attribute(attribute:"see_also", value:"http://galleryproject.org/node/93");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Gallery 1.4-pl2 or 1.4.1 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:ND");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:F/RL:O/RC:X");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2003-1227");

  script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_cwe_id(94);

  script_set_attribute(attribute:"vuln_publication_date", value:"2003/10/13");
  script_set_attribute(attribute:"patch_publication_date", value:"2003/10/12");
  script_set_attribute(attribute:"plugin_publication_date", value:"2003/10/11");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:gallery_project:gallery");
  script_set_attribute(attribute:"thorough_tests", value:"true");
  script_end_attributes();

  script_category(ACT_ATTACK);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2003-2022 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("gallery_detect.nasl");
  script_require_keys("www/gallery", "www/PHP");
  script_exclude_keys("Settings/disable_cgi_scanning");
  script_require_ports("Services/www", 80);

  exit(0);
}

#
# The script code starts here
#

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
include("webapp_func.inc");

port = get_http_port(default:80, php:TRUE);

install = get_install_from_kb(
  appname      : "gallery",
  port         : port,
  exit_on_fail : TRUE
);

dir = install["dir"];

r = http_send_recv3(
  method : "GET",
  item   : dir + "/setup/index.php?GALLERY_BASEDIR=http://example.com/",
  port   : port,
  exit_on_fail : TRUE
);

if (egrep(pattern:"http://example.com//?util.php", string:r[2])) security_hole(port);
else audit(AUDIT_WEB_APP_NOT_AFFECTED,"Gallery", build_url(qs:dir,port:port));

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.022

Percentile

89.4%

Related for GALLERY_INJECTION2.NASL