Lucene search

K
nessusThis script is Copyright (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.LIGHTTPD_SCRIPT_SOURCE_DISCLOSURE.NASL
HistoryMar 27, 2006 - 12:00 a.m.

lighttpd on Windows < 1.4.10a Crafted Filename Request Script Source Disclosure

2006-03-2700:00:00
This script is Copyright (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
12

According to its banner, the version of lighttpd running on the remote Windows host is prior to 1.4.10a. It is, therefore, affected by an information disclosure vulnerability due to a failure to properly validate filename extensions in URLs. A remote attacker can exploit this issue, via specially crafted requests with dot and space characters, to disclose the source of scripts hosted by the affected application.

Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version number.

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description) 
{
  script_id(21155);
  script_version("1.25");

  script_cve_id("CVE-2006-0814");
  script_bugtraq_id(16893);

  script_name(english:"lighttpd on Windows < 1.4.10a Crafted Filename Request Script Source Disclosure");
  script_summary(english:"Checks version of lighttpd.");
 
  script_set_attribute(attribute:"synopsis", value:
"The remote web server is affected by an information disclosure
vulnerability.");
  script_set_attribute(attribute:"description", value:
"According to its banner, the version of lighttpd running on the remote
Windows host is prior to 1.4.10a. It is, therefore, affected by an
information disclosure vulnerability due to a failure to properly
validate filename extensions in URLs. A remote attacker can exploit
this issue, via specially crafted requests with dot and space
characters, to disclose the source of scripts hosted by the affected
application.

Note that Nessus has not tested for this issue but has instead relied
only on the application's self-reported version number.");
  script_set_attribute(attribute:"see_also", value:"https://secuniaresearch.flexerasoftware.com/secunia_research/2006-9/advisory/" );
  script_set_attribute(attribute:"solution", value:
"Upgrade to lighttpd for Windows version 1.4.10a or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:F/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2006-0814");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"exploit_framework_canvas", value:"true");
  script_set_attribute(attribute:"canvas_package", value:'D2ExploitPack');

  script_set_attribute(attribute:"plugin_publication_date", value: "2006/03/27");
  script_set_attribute(attribute:"vuln_publication_date", value: "2006/03/01");

  script_cvs_date("Date: 2018/11/15 20:50:25");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:lighttpd:lighttpd");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Web Servers");

  script_copyright(english:"This script is Copyright (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("lighttpd_detect.nasl");
  script_require_keys("installed_sw/lighttpd");
  script_require_ports("Services/www", 80);

  exit(0);
}

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
include("audit.inc");
include("install_func.inc");

get_install_count(app_name:"lighttpd", exit_if_zero:TRUE);
port = get_http_port(default:80, embedded:TRUE);
install = get_single_install(app_name:"lighttpd", port:port, exit_if_unknown_ver:TRUE);

if (empty_or_null(install["os"]) || install["os"] != "Win32")
{
  audit(AUDIT_LISTEN_NOT_VULN, "lighttpd", port, install["version"]);
}

if (pgrep(pattern:"1\.4\.([0-9]|10)$", string:install["version"]))
{
  report =
      '\n  Version source    : ' + install["source"] +
      '\n  Installed version : ' + install["version"] +
      '\n  Fixed version     : 1.4.10a\n';
  security_report_v4(severity:SECURITY_WARNING, port:port, extra:report);
}
else
{
  audit(AUDIT_LISTEN_NOT_VULN, "lighttpd", port, install["version"]);
}
VendorProductVersionCPE
lighttpdlighttpdcpe:/a:lighttpd:lighttpd
Related for LIGHTTPD_SCRIPT_SOURCE_DISCLOSURE.NASL