According to its banner, the version of phpScheduleIt on the remote host is earlier than 1.0.1. Such versions are reportedly vulnerable to an undisclosed issue that may allow an attacker to modify or delete reservations.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(15772);
script_version("1.19");
script_set_attribute(attribute:"plugin_modification_date", value:"2022/04/11");
script_cve_id("CVE-2004-2469");
script_bugtraq_id(11690);
script_name(english:"phpScheduleIt < 1.0.1 Reservation.class.php Arbitrary Reservation Modification");
script_set_attribute(attribute:"synopsis", value:
"The remote web server contains a PHP application that is affected by a
security bypass vulnerability.");
script_set_attribute(attribute:"description", value:
"According to its banner, the version of phpScheduleIt on the remote
host is earlier than 1.0.1. Such versions are reportedly vulnerable
to an undisclosed issue that may allow an attacker to modify or delete
reservations.");
# http://sourceforge.net/tracker/index.php?func=detail&aid=1051841&group_id=95547&atid=611778
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?91b81e79");
script_set_attribute(attribute:"solution", value:
"Upgrade to phpScheduleIt 1.0.1 or later.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2004/10/21");
script_set_attribute(attribute:"plugin_publication_date", value:"2004/11/20");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value:"cpe:/a:brickhost:phpscheduleit");
script_set_attribute(attribute:"thorough_tests", value:"true");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"CGI abuses");
script_copyright(english:"This script is Copyright (C) 2004-2022 Tenable Network Security, Inc.");
script_dependencies("phpscheduleit_detect.nasl");
script_require_keys("www/PHP");
script_exclude_keys("Settings/disable_cgi_scanning");
script_require_ports("Services/www", 80);
exit(0);
}
#
# The script code starts here
#
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
port = get_http_port(default:80);
if(!can_host_php(port:port))exit(0);
# Check an install.
install = get_kb_item(string("www/", port, "/phpscheduleit"));
if (isnull(install)) exit(0);
matches = eregmatch(string:install, pattern:"^(.+) under (/.*)$");
if (!isnull(matches))
{
ver = matches[1];
if ( ereg(pattern:"^(0\.|1\.0\.0)", string:ver))
security_warning(port);
}
Vendor | Product | Version | CPE |
---|---|---|---|
brickhost | phpscheduleit | cpe:/a:brickhost:phpscheduleit |