Lucene search

K
nessusThis script is Copyright (C) 2012-2021 Tenable Network Security, Inc.SQUIDCLAMAV_URL_XSS.NASL
HistorySep 10, 2012 - 12:00 a.m.

SquidClamav clwarn.cgi url Parameter XSS

2012-09-1000:00:00
This script is Copyright (C) 2012-2021 Tenable Network Security, Inc.
www.tenable.com
24

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.003 Low

EPSS

Percentile

65.6%

The version of SquidClamav installed on the remote host is affected by a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input to the ‘url’ parameter of the ‘clwarn.cgi’ script. An attacker may leverage this issue to execute arbitrary script in the browser of an unsuspecting user to be executed within the security context of the affected site.

Note that the application is also reportedly affected by cross-site scripting vulnerabilities with the ‘source’, ‘virus’ and ‘user’ parameters of the ‘clwarn.cgi’ script but Nessus has not tested the additional parameters.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(62030);
  script_version("1.7");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");

  script_cve_id("CVE-2012-4667");
  script_bugtraq_id(55293);

  script_name(english:"SquidClamav clwarn.cgi url Parameter XSS");
  script_summary(english:"Tries to inject script code via the url parameter");

  script_set_attribute(attribute:"synopsis", value:
"The remote web server hosts a CGI script that is affected by a
cross-site scripting vulnerability.");
  script_set_attribute(attribute:"description", value:
"The version of SquidClamav installed on the remote host is affected by
a cross-site scripting vulnerability because it fails to properly
sanitize user-supplied input to the 'url' parameter of the 'clwarn.cgi'
script.  An attacker may leverage this issue to execute arbitrary script
in the browser of an unsuspecting user to be executed within the
security context of the affected site. 

Note that the application is also reportedly affected by cross-site
scripting vulnerabilities with the 'source', 'virus' and 'user'
parameters of the 'clwarn.cgi' script but Nessus has not tested the
additional parameters.");
  # https://github.com/darold/squidclamav/commit/5806d10a31183a0b0d18eccc3a3e04e536e2315b
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?5a9d0663");
  script_set_attribute(attribute:"see_also", value:"http://squidclamav.darold.net/news.html");
  script_set_attribute(attribute:"solution", value:"Update to version 5.8 / 6.7 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);

  script_set_attribute(attribute:"vuln_publication_date", value:"2012/07/24");
  script_set_attribute(attribute:"patch_publication_date", value:"2012/07/24");
  script_set_attribute(attribute:"plugin_publication_date", value:"2012/09/10");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:darold:squidclamav");
  script_end_attributes();

  script_category(ACT_ATTACK);
  script_family(english:"CGI abuses : XSS");

  script_copyright(english:"This script is Copyright (C) 2012-2021 Tenable Network Security, Inc.");

  script_dependencies("squidclamav_detect.nasl");
  script_exclude_keys("Settings/disable_cgi_scanning");
  script_require_ports("Services/www", 80);
  script_require_keys("www/squidclamav");

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
include("url_func.inc");
include("webapp_func.inc");

port = get_http_port(default:80);

install = get_install_from_kb(
  appname      : "squidclamav",
  port         : port,
  exit_on_fail : TRUE
);

dir = install["dir"];
page = '/clwarn.cgi';
xss_test = '<script>alert(' + "'" + SCRIPT_NAME + '-' + unixtime() + "'" + ')</script>';

pass_re = str_replace(string:xss_test, find:"(", replace:"\(");
pass_re = str_replace(string:pass_re, find:")", replace:"\)");

exploit = test_cgi_xss(
  port     : port,
  dirs     : make_list(dir),
  cgi      : page,
  qs       : 'url=' + urlencode(str:xss_test),
  pass_re  : '(#0000FF">|URL )' + pass_re,
  ctrl_re  : '">SquidClamAv'
);

if (!exploit)  audit(AUDIT_WEB_APP_NOT_AFFECTED, "SquidClamav", build_url(qs:dir+page,port:port));
VendorProductVersionCPE
daroldsquidclamavcpe:/a:darold:squidclamav

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.003 Low

EPSS

Percentile

65.6%