Lucene search

K
nessusThis script is Copyright (C) 2000-2021 Tenable Network Security, Inc.RPM_QUERY.NASL
HistoryMar 07, 2000 - 12:00 a.m.

rpm_query CGI System Information Disclosure

2000-03-0700:00:00
This script is Copyright (C) 2000-2021 Tenable Network Security, Inc.
www.tenable.com
20

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.02 Low

EPSS

Percentile

88.8%

The rpm_query CGI is installed.

This CGI allows anyone who can connect to this web server to obtain the list of the installed RPMs.

This allows an attacker to determine the version number of your installed services, hence making their attacks more accurate.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
 script_id(10340);
 script_version("1.26");
 script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");

 script_cve_id("CVE-2000-0192");
 script_bugtraq_id(1036);

 script_name(english:"rpm_query CGI System Information Disclosure");
 script_summary(english:"checks for rpm_query");

 script_set_attribute(attribute:"synopsis", value:
"The remote web server is affected by an information disclosure
vulnerability.");
 script_set_attribute(attribute:"description", value:
"The rpm_query CGI is installed.

This CGI allows anyone who can connect to this web server to obtain
the list of the installed RPMs.

This allows an attacker to determine the version number of your
installed services, hence making their attacks more accurate.");
 script_set_attribute(attribute:"solution", value:"Remove this CGI from cgi-bin/");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"false");

 script_set_attribute(attribute:"vuln_publication_date", value:"2000/03/05");
 script_set_attribute(attribute:"plugin_publication_date", value:"2000/03/07");

 script_set_attribute(attribute:"potential_vulnerability", value:"true");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_end_attributes();

 script_category(ACT_ATTACK);
 script_copyright(english:"This script is Copyright (C) 2000-2021 Tenable Network Security, Inc.");
 script_family(english:"CGI abuses");

 script_dependencie("http_version.nasl", "webmirror.nasl", "no404.nasl");
 script_require_keys("Settings/ParanoidReport");
 script_require_ports("Services/www", 80);

 exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

if (report_paranoia < 2) audit(AUDIT_PARANOID);

port = get_http_port(default:80);
res = is_cgi_installed3(item:"rpm_query", port:port);
if(res) security_warning(port);

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.02 Low

EPSS

Percentile

88.8%

Related for RPM_QUERY.NASL