Lucene search

K
nessusThis script is Copyright (C) 2002-2021 Tenable Network Security, Inc.VIRALATOR.NASL
HistoryAug 22, 2002 - 12:00 a.m.

Viralator CGI Script Arbitrary Command Execution

2002-08-2200:00:00
This script is Copyright (C) 2002-2021 Tenable Network Security, Inc.
www.tenable.com
23

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.026 Low

EPSS

Percentile

90.5%

The CGI ‘viralator.cgi’ is installed. Some versions of this CGI are don’t check properly the user input and allow anyone to execute arbitrary commands with the privileges of the web server.

** No flaw was tested. Your script might be a safe version.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

# References:
# http://marc.info/?l=bugtraq&m=100463639800515&w=2

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
 script_id(11107);
 script_version("1.22");
 script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");

 script_cve_id("CVE-2001-0849");
 script_bugtraq_id(3495);

 script_name(english:"Viralator CGI Script Arbitrary Command Execution");
 script_summary(english:"Checks for the presence of /cgi-bin/viralator.cgi");

 script_set_attribute(attribute:"synopsis", value:
"The remote host has an application that may allow arbitrary code
execution on the remote system.");
 script_set_attribute(attribute:"description", value:
"The CGI 'viralator.cgi' is installed. Some versions of this CGI are
don't check properly the user input and allow anyone to execute
arbitrary commands with the privileges of the web server.

** No flaw was tested. Your script might be a safe version.");
 script_set_attribute(attribute:"solution", value:"Upgrade this script to version 0.9pre2 or later");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"false");

 script_set_attribute(attribute:"vuln_publication_date", value:"2001/11/01");
 script_set_attribute(attribute:"plugin_publication_date", value:"2002/08/22");

 script_set_attribute(attribute:"potential_vulnerability", value:"true");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2002-2021 Tenable Network Security, Inc.");
 script_family(english:"CGI abuses");

 script_dependencie("http_version.nasl", "find_service1.nasl", "no404.nasl");
 script_require_keys("Settings/ParanoidReport");
 script_require_ports("Services/www", 80);

 exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

if (report_paranoia < 2) audit(AUDIT_PARANOID);

port = get_http_port(default:80);

if (is_cgi_installed3(port: port, item:"/viralator.cgi"))
  security_hole(port);

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.026 Low

EPSS

Percentile

90.5%

Related for VIRALATOR.NASL