Lucene search

K
nessusThis script is Copyright (C) 2005-2022 and is owned by Tenable, Inc. or an Affiliate thereof.POSTNUKE_0_760_RC2.NASL
HistoryMar 01, 2005 - 12:00 a.m.

PostNuke <= 0.760 RC2 Multiple Vulnerabilities

2005-03-0100:00:00
This script is Copyright (C) 2005-2022 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
14

The remote host is running PostNuke version 0.760 RC2 or older. These versions suffer from several vulnerabilities, among them :

  • SQL injection vulnerability in the News, NS-Polls and NS-AddStory modules.
  • SQL injection vulnerability in the Downloads module.
  • Cross-site scripting vulnerabilities in the Downloads module.
  • Possible path disclosure vulnerability in the News module.

An attacker may use the SQL injection vulnerabilities to obtain the password hash for the administrator or to corrupt the database database used by PostNuke.

Exploiting the XSS flaws may enable an attacker to inject arbitrary script code into the browser of site administrators leading to disclosure of session cookies.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(17240);
  script_version("1.22");
  script_set_attribute(attribute:"plugin_modification_date", value:"2022/04/11");

  script_cve_id("CVE-2005-0615", "CVE-2005-0616", "CVE-2005-0617");
  script_bugtraq_id(12683, 12684, 12685);

  script_name(english:"PostNuke <= 0.760 RC2 Multiple Vulnerabilities");

  script_set_attribute(attribute:"synopsis", value:
"The remote web server contains a PHP application that suffers from
multiple vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"The remote host is running PostNuke version 0.760 RC2 or older.  These
versions suffer from several vulnerabilities, among them :

  - SQL injection vulnerability in the News, NS-Polls and 
    NS-AddStory modules.
  - SQL injection vulnerability in the Downloads module.
  - Cross-site scripting vulnerabilities in the Downloads
    module.
  - Possible path disclosure vulnerability in the News module.

An attacker may use the SQL injection vulnerabilities to obtain the
password hash for the administrator or to corrupt the database
database used by PostNuke. 

Exploiting the XSS flaws may enable an attacker to inject arbitrary
script code into the browser of site administrators leading to
disclosure of session cookies.");
  script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2005/Mar/8");
  script_set_attribute(attribute:"see_also", value:"http://news.postnuke.com/Article2669.html");
  script_set_attribute(attribute:"solution", value:
"Either upgrade and apply patches for 0.750 or upgrade to 0.760 RC3 or
later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");

  script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2005/02/28");
  script_set_attribute(attribute:"plugin_publication_date", value:"2005/03/01");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:postnuke_software_foundation:postnuke");
  script_set_attribute(attribute:"thorough_tests", value:"true");
  script_end_attributes();

  script_category(ACT_ATTACK);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2005-2022 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("postnuke_detect.nasl");
  script_require_keys("www/PHP");
  script_exclude_keys("Settings/disable_cgi_scanning");
  script_require_ports("Services/www", 80);

  exit(0);
}

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80);
if (!can_host_php(port:port))exit(0);

kb = get_kb_item("www/" + port + "/postnuke" );
if (! kb) exit(0);
install = eregmatch(pattern:"(.*) under (.*)", string:kb );
ver = install[1];
dir = install[2];

# Try the SQL injection exploits.
exploits = make_list(
  "catid='cXIb8O3",
  "name=Downloads&req=search&query=&show=cXIb8O3",
  "name=Downloads&req=search&query=&orderby="
);

foreach exploit (exploits) {
  if (test_cgi_xss(port: port, cgi: "/index.php", qs: exploit, dirs: make_list(dir),
 sql_injection: 1, high_risk: 1,
 pass_re: "DB Error: getArticles:|Fatal error: .+/modules/Downloads/dl-search.php"))
  exit(0);
}
VendorProductVersionCPE
postnuke_software_foundationpostnukecpe:/a:postnuke_software_foundation:postnuke
Related for POSTNUKE_0_760_RC2.NASL