Lucene search

K
nessusThis script is Copyright (C) 2005-2022 Tenable Network Security, Inc.GALLERY_POSTNUKE_ACCESS_VALIDATION.NASL
HistoryAug 12, 2005 - 12:00 a.m.

Gallery PostNuke Integration Access Validation Privilege Escalation

2005-08-1200:00:00
This script is Copyright (C) 2005-2022 Tenable Network Security, Inc.
www.tenable.com
20

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.001

Percentile

25.6%

The remote host is running Gallery, a web-based photo album.

According to its banner, the version of Gallery installed on the remote host is subject to an access validation issue when integrated with PostNuke, as is the case on the remote host. The issue means that any user with any level of admin privileges in PostNuke also has admin privileges in Gallery.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(19419);
  script_version("1.17");
  script_set_attribute(attribute:"plugin_modification_date", value:"2022/06/01");

  script_cve_id("CVE-2005-2596");
  script_bugtraq_id(14547);

  script_name(english:"Gallery PostNuke Integration Access Validation Privilege Escalation");

  script_set_attribute(attribute:"synopsis", value:
"The remote web server contains a PHP application that does not
properly validate access.");
  script_set_attribute(attribute:"description", value:
"The remote host is running Gallery, a web-based photo album. 

According to its banner, the version of Gallery installed on the
remote host is subject to an access validation issue when integrated
with PostNuke, as is the case on the remote host.  The issue means
that any user with any level of admin privileges in PostNuke also has
admin privileges in Gallery.");
  script_set_attribute(attribute:"see_also", value:"http://gallery.menalto.com/index.php?name=PNphpBB2&file=viewtopic&t=7048");
  # http://gallery.menalto.com/modules.php?op=modload&name=News&file=article&sid=164&mode=thread&order=0&thold=0
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?741ad7ee");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Gallery 1.5.1-RC2 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:S/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:F/RL:ND/RC:ND");

  script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
  script_set_attribute(attribute:"exploit_available", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2005/08/10");
  script_set_attribute(attribute:"plugin_publication_date", value:"2005/08/12");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"thorough_tests", value:"true");
  script_end_attributes();

  script_category(ACT_ATTACK);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2005-2022 Tenable Network Security, Inc.");

  script_dependencies("postnuke_detect.nasl");
  script_require_keys("www/PHP");
  script_exclude_keys("Settings/disable_cgi_scanning");
  script_require_ports("Services/www", 80);

  exit(0);
}

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");


port = get_http_port(default:80);
if (!can_host_php(port:port)) exit(0);


# Test an install.
install = get_kb_item(string("www/", port, "/postnuke"));
if (isnull(install)) exit(0);
matches = eregmatch(string:install, pattern:"^(.+) under (/.*)$");
if (!isnull(matches)) {
  dir = matches[2];

  # Call up Gallery's main index.
  w = http_send_recv3(method:"GET",
    item:string(
      dir, "/modules.php?",
      "op=modload&",
      "name=gallery&",
      "file=index"
    ), 
    port:port
  );
  if (isnull(w)) exit(1, "the web server did not answer");
  res = w[2];

  # There's a problem if the reported version is < 1.5.1-RC2.
  if (egrep(string:res, pattern:"Powered by <a href=.+>Gallery.* v(0\.|1\.([0-4]\.|5\.(0|1-RC1)))")) {
    security_warning(port);
    exit(0);
  }
}

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.001

Percentile

25.6%

Related for GALLERY_POSTNUKE_ACCESS_VALIDATION.NASL