Lucene search

K
nessusThis script is Copyright (C) 2005-2021 Tenable Network Security, Inc.INTERCHANGE_521.NASL
HistorySep 26, 2005 - 12:00 a.m.

Interchange < 5.0.2 / 5.2.1 Multiple Vulnerabilities (SQLi, Code Exe)

2005-09-2600:00:00
This script is Copyright (C) 2005-2021 Tenable Network Security, Inc.
www.tenable.com
10

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.006 Low

EPSS

Percentile

79.5%

The remote host appears to be running Interchange, an open source application server that handles state management, authentication, session maintenance, click trails, filtering, URL encodings, and security policy.

According to its banner, the installed version of Interchange fails to sanitize input passed through to the ‘forum/submit.html’ page, which may lead to either SQL injection or cross-site scripting attacks.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description) {
  script_id(19779);
  script_version("1.18");

  script_cve_id("CVE-2005-3072", "CVE-2005-3073");
  script_bugtraq_id(14931);

  script_name(english:"Interchange < 5.0.2 / 5.2.1 Multiple Vulnerabilities (SQLi, Code Exe)");
 
 script_set_attribute(attribute:"synopsis", value:
"The remote web server uses an application server that may be prone to
SQL injection or cross-site scripting attacks." );
 script_set_attribute(attribute:"description", value:
"The remote host appears to be running Interchange, an open source
application server that handles state management, authentication,
session maintenance, click trails, filtering, URL encodings, and
security policy. 

According to its banner, the installed version of Interchange fails to
sanitize input passed through to the 'forum/submit.html' page, which
may lead to either SQL injection or cross-site scripting attacks." );
  # http://www.icdevgroup.org/pipermail/interchange-users/2005-September/043899.html
 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?c36476c6" );
  # http://www.icdevgroup.org/pipermail/interchange-users/2005-September/043900.html
 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?354ffb6a" );
 script_set_attribute(attribute:"solution", value:
"Upgrade to Interchange 5.0.2 / 5.2.1 or later." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"true");
 script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);

 script_set_attribute(attribute:"plugin_publication_date", value: "2005/09/26");
 script_set_attribute(attribute:"vuln_publication_date", value: "2005/09/22");
 script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value: "cpe:/a:interchange_development_group:interchange");
script_end_attributes();

  script_summary(english:"Checks for multiple vulnerabilities in Interchange < 5.0.2 / 5.2.1");
  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses");
  script_copyright(english:"This script is Copyright (C) 2005-2021 Tenable Network Security, Inc.");
  script_dependencies("http_version.nasl");
  script_exclude_keys("Settings/disable_cgi_scanning");
  script_require_ports("Services/www", 80);
  exit(0);
}


include("global_settings.inc");
include("misc_func.inc");
include("http.inc");


port = get_http_port(default:80);

# Loop through CGI directories.
foreach dir (cgi_dirs()) {
  # Look for the admin login page -- it has a version number.
  w = http_send_recv3(method:"GET", item:string(dir, "/admin/login.html"), port:port);
  if (isnull(w)) exit(1, "The web server did not answer");
  res = w[2];

  # If ...
  if (
    # it looks like Interchange's admin login page and...
    egrep(string:res, pattern:'^<FORM ACTION=".+/process" METHOD=POST name=login>') &&
    '<INPUT TYPE=hidden NAME=mv_nextpage VALUE="admin/index">' >< res &&
    # the version number is < 5.0.2 / 5.2.0.
    egrep(string:res, pattern:"^ +([0-4]\.|5\.(0\.[01]|2\.0)) &copy; 20.+ Interchange Development Group&nbsp;")
  ) {
    security_hole(port);
    set_kb_item(name: 'www/'+port+'/XSS', value: TRUE);
    set_kb_item(name: 'www/'+port+'/SQLInjection', value: TRUE);
    exit(0);
  }
}
VendorProductVersionCPE
interchange_development_groupinterchangecpe:/a:interchange_development_group:interchange

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.006 Low

EPSS

Percentile

79.5%

Related for INTERCHANGE_521.NASL