Lucene search

K
nessusThis script is Copyright (C) 2006-2021 Tenable Network Security, Inc.NETWORKACTIV_SCRIPT_SOURCE_DISCLOSURE.NASL
HistoryMar 27, 2006 - 12:00 a.m.

NetworkActiv Web Server Crafted Filename Request Script Source Disclosure

2006-03-2700:00:00
This script is Copyright (C) 2006-2021 Tenable Network Security, Inc.
www.tenable.com
16

The remote host is running NetworkActiv Web Server, a freeware web server for Windows.

According to its banner, the installed version of NetworkActiv Web Server does not properly validate the extension of filenames before deciding how to serve them. By including a forward-slash character, a remote attacker may be able to leverage this issue to disclose the source of scripts hosted by the affected application.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#


include('deprecated_nasl_level.inc');
include('compat.inc');

if (description) {
  script_id(21154);
  script_version("1.16");

  script_cve_id("CVE-2006-0815");
  script_bugtraq_id(16895);

  script_name(english:"NetworkActiv Web Server Crafted Filename Request Script Source Disclosure");
  script_summary(english:"Checks version of NetworkActiv Web Server");
 
 script_set_attribute(attribute:"synopsis", value:
"The remote web server suffers from an information disclosure flaw." );
 script_set_attribute(attribute:"description", value:
"The remote host is running NetworkActiv Web Server, a freeware web
server for Windows. 

According to its banner, the installed version of NetworkActiv Web
Server does not properly validate the extension of filenames before
deciding how to serve them.  By including a forward-slash character, 
a remote attacker may be able to leverage this issue to disclose the
source of scripts hosted by the affected application." );
 script_set_attribute(attribute:"see_also", value:"https://secuniaresearch.flexerasoftware.com/secunia_research/2006-10/advisory/" );
 script_set_attribute(attribute:"see_also", value:"http://www.networkactiv.com/WebServer.html" );
 script_set_attribute(attribute:"solution", value:
"Upgrade to NetworkActiv Web Server version 3.5.16 or later." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
 script_set_cvss_temporal_vector("CVSS2#E:F/RL:U/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");
 script_set_attribute(attribute:"plugin_publication_date", value: "2006/03/27");
 script_set_attribute(attribute:"vuln_publication_date", value: "2006/03/01");
 script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe",value:"cpe:/a:networkactiv:networkactiv_web_server");
script_end_attributes();


  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2006-2021 Tenable Network Security, Inc.");

  script_dependencies("http_version.nasl");
  script_require_ports("Services/www", 80);

  exit(0);
}

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");


port = get_http_port(default:80);

banner = get_http_banner(port:port);
if (! banner) exit(1, "No HTTP banner on port "+port);

if (
  egrep(pattern:"^Server: NetworkActiv-Web-Server/([0-2]\.|3\.([0-4]($|\.)|5($|\.[0-9]([^0-9].*)?$|\.1[0-5])))", string:banner)
) security_warning(port);
VendorProductVersionCPE
networkactivnetworkactiv_web_servercpe:/a:networkactiv:networkactiv_web_server
Related for NETWORKACTIV_SCRIPT_SOURCE_DISCLOSURE.NASL