Lucene search

K
nessusThis script is Copyright (C) 2006-2022 Tenable Network Security, Inc.JOOMLA_1011.NASL
HistorySep 01, 2006 - 12:00 a.m.

Joomla! < 1.0.11 administrator/index.php Input Weakness

2006-09-0100:00:00
This script is Copyright (C) 2006-2022 Tenable Network Security, Inc.
www.tenable.com
27

The version of Joomla! installed on the remote host is affected by an input weakness flaw in the administrator/index.php script due to improper sanitization of user-supplied input. An unauthenticated, remote attacker can exploit this to impact confidentiality, integrity, or availability. No other details are available.

Note that Joomla! is reportedly affected by additional vulnerabilities; however, Nessus has not tested for these.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(22297);
  script_version("1.24");
  script_set_attribute(attribute:"plugin_modification_date", value:"2022/04/11");

  script_cve_id("CVE-2006-4468");
  script_bugtraq_id(19749);

  script_name(english:"Joomla! < 1.0.11 administrator/index.php Input Weakness");

  script_set_attribute(attribute:"synopsis", value:
"The remote web server contains a PHP application that is affected by
an input sanitization vulnerability.");
  script_set_attribute(attribute:"description", value:
"The version of Joomla! installed on the remote host is affected by an
input weakness flaw in the administrator/index.php script due to
improper sanitization of user-supplied input. An unauthenticated,
remote attacker can exploit this to impact confidentiality, integrity,
or availability. No other details are available.

Note that Joomla! is reportedly affected by additional
vulnerabilities; however, Nessus has not tested for these.");
  # http://web.archive.org/web/20080701014536/http://www.joomla.org/content/view/1843/74/
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?9c6f8af3");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Joomla! version 1.0.11 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:F/RL:O/RC:C");

  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_cwe_id(94, 264);

  script_set_attribute(attribute:"vuln_publication_date", value:"2006/08/28");
  script_set_attribute(attribute:"patch_publication_date", value:"2006/08/28");
  script_set_attribute(attribute:"plugin_publication_date", value:"2006/09/01");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:joomla:joomla\!");
  script_set_attribute(attribute:"thorough_tests", value:"true");
  script_end_attributes();

  script_category(ACT_ATTACK);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2006-2022 Tenable Network Security, Inc.");

  script_dependencies("joomla_detect.nasl");
  script_require_keys("installed_sw/Joomla!", "www/PHP");
  script_require_ports("Services/www", 80);

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
include("install_func.inc");

app = "Joomla!";
get_install_count(app_name:app, exit_if_zero:TRUE);

port = get_http_port(default:80, php:TRUE);

install = get_single_install(
  app_name : app,
  port     : port
);

dir = install['path'];
test_script = SCRIPT_NAME - ".nasl";
# Make sure input is sanitized to the index2.php script.
#
# nb: if globals.php is included, it will complain because GLOBALS is protected.
url1 = dir + "/administrator/index2.php?GLOBALS=" + test_script;
w = http_send_recv3(
  method : "GET",
  item   : url1,
  port   : port,
  exit_on_fail : TRUE
);
res = w[2];

# If it does...
if ("Illegal variable" >!< res)
{
  url2 = dir + "/administrator/index.php?GLOBALS=" + test_script;
  # See whether index.php calls globals.php.
  w = http_send_recv3(
    method : "GET",
    item   : url2,
    port   : port,
    exit_on_fail : TRUE
  );
  res = w[2];

  if ("Illegal variable" >< res)
  {
    security_report_v4(
      port     : port,
      generic  : TRUE,
      severity : SECURITY_WARNING,
      request  : make_list(build_url(qs:url1, port:port), build_url(qs:url2, port:port)),
      output   : chomp(res)
    );
    exit(0);
  }
}
else
  audit(AUDIT_WEB_APP_NOT_AFFECTED, app, build_url(qs:dir, port:port));
VendorProductVersionCPE
joomlajoomla%5c%21cpe:/a:joomla:joomla%5c%21
Related for JOOMLA_1011.NASL