Lucene search

K
nessusThis script is Copyright (C) 2003-2021 and is owned by Tenable, Inc. or an Affiliate thereof.GOSA_CODE_INJECTION.NASL
HistoryFeb 27, 2003 - 12:00 a.m.

GOsa Multiple Script plugin Parameter Remote File Inclusion

2003-02-2700:00:00
This script is Copyright (C) 2003-2021 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
13

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.117 Low

EPSS

Percentile

95.4%

The remote web server is hosting GOnicus System Administrator (GOsa), a PHP-based administration tool for managing accounts and systems in LDAP databases.

The version of GOsa installed on the remote host fails to sanitize user input to the ‘plugin’ parameter of several scripts before using it to include PHP code.

An unauthenticated, remote attacker can leverage these issues to view arbitrary files or possibly to execute arbitrary PHP code, possibly taken from third-party hosts.

Note that GOsa reportedly doesn’t support disabling PHP’s ‘register_globals’ setting.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

# Ref:
# From: Karol Wiesek <[email protected]>
# To: [email protected]
# Subject: GOnicus System Administrator php injection
# Message-ID: <[email protected]>


include('deprecated_nasl_level.inc');
include('compat.inc');

if(description)
{
  script_id(11275);
  script_version("1.30");

  script_cve_id("CVE-2003-1412");
  script_bugtraq_id(6922);

  script_name(english:"GOsa Multiple Script plugin Parameter Remote File Inclusion");
  script_summary(english:"Checks for the presence of remotehtmlview.php");

  script_set_attribute(attribute:"synopsis",value:
"The remote web server contains a PHP application that is affected by
multiple remote file include vulnerabilities." );
  script_set_attribute(attribute:"description", value:
"The remote web server is hosting GOnicus System Administrator (GOsa),
a PHP-based administration tool for managing accounts and systems in
LDAP databases.

The version of GOsa installed on the remote host fails to sanitize
user input to the 'plugin' parameter of several scripts before using
it to include PHP code.

An unauthenticated, remote attacker can leverage these issues to view
arbitrary files or possibly to execute arbitrary PHP code, possibly
taken from third-party hosts.

Note that GOsa reportedly doesn't support disabling PHP's
'register_globals' setting." );
  script_set_attribute(attribute:"see_also", value:"https://seclists.org/fulldisclosure/2003/Feb/327");
  script_set_attribute(attribute:"solution", value: "Unknown at this time." );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:H/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2003-1412");
  script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_cwe_id(94);
  script_set_attribute(attribute:"vuln_publication_date", value:"2003/02/23");
  script_set_attribute(attribute:"plugin_publication_date", value:"2003/02/27");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_end_attributes();

  script_category(ACT_ATTACK);
  script_copyright(english:"This script is Copyright (C) 2003-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_family(english:"CGI abuses");

  script_dependencie("find_service1.nasl", "http_version.nasl");
  script_require_ports("Services/www", 80);
  script_exclude_keys("Settings/disable_cgi_scanning");
  script_require_keys("www/PHP");
  exit(0);
}

#
# The script code starts here
#

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80);
if (!can_host_php(port:port)) exit(0, "Web server does not support PHP scripts.");



function check(loc)
{
 local_var r;
 r = http_send_recv3(method:"GET",
     item:string(loc, "/include/help.php?base=http://example.com"),
 		port:port);	
 if (isnull(r)) exit(1, "The web server failed to respond.");

 if(egrep(pattern:".*http://example.com/include/common\.inc", string:r[2]))
 {
 	security_hole(port);
	exit(0);
 }
}

foreach dir (cgi_dirs())
{
 check(loc:dir);
}

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.117 Low

EPSS

Percentile

95.4%

Related for GOSA_CODE_INJECTION.NASL