WebGUI user profile Unspecified Vulnerability

2004-11-22T00:00:00
ID WEBGUI_UNSPECIFIED_VULN.NASL
Type nessus
Reporter Tenable
Modified 2018-08-08T00:00:00

Description

The remote host is running WebGUI, a content management system from Plain Black Software.

According to its banner, the version of this software on the remote is earlier than 6.2.9 and thus affected by an undisclosed remote vulnerability related to the 'user profile' feature.

                                        
                                            #
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if(description)
{
 script_id(15787);
 script_version("1.15");
 script_bugtraq_id(11727);

 script_name(english:"WebGUI user profile Unspecified Vulnerability");

 script_set_attribute(attribute:"synopsis", value:
"The remote web server contains a CGI script that has an unspecified
remote flaw." );
 script_set_attribute(attribute:"description", value:
"The remote host is running WebGUI, a content management system from
Plain Black Software. 

According to its banner, the version of this software on the remote is
earlier than 6.2.9 and thus affected by an undisclosed remote
vulnerability related to the 'user profile' feature." );
 script_set_attribute(attribute:"see_also", value:"http://sourceforge.net/project/shownotes.php?release_id=284011" );
 script_set_attribute(attribute:"solution", value:
"Upgrade to WebGUI 6.2.9 or newer." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");
 script_set_attribute(attribute:"plugin_publication_date", value: "2004/11/22");
 script_set_attribute(attribute:"vuln_publication_date", value: "2004/11/19");
 script_cvs_date("Date: 2018/08/08 12:52:13");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();


 script_summary(english:"Checks the version of WebGUI");
 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2004-2018 Tenable Network Security, Inc.");
 script_family(english:"CGI abuses");
 script_dependencie("http_version.nasl");
 script_exclude_keys("Settings/disable_cgi_scanning");
 script_require_ports("Services/www", 80);
 script_require_keys("Settings/ParanoidReport");
 exit(0);
}

#
# The script code starts here
#
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80);

res = http_get_cache(item:"/", port:port, exit_on_fail: 1);

if ( 'content="WebGUI' >< res && egrep(pattern:".*meta name=.generator.*content=.WebGUI ([0-5]\.|6\.([01]\.|2\.[0-8][^0-9]))", string:res) )
  security_hole(port);