Lucene search

K
openvasCopyright (C) 2000 Noam RathausOPENVAS:136141256231010348
HistoryNov 03, 2005 - 12:00 a.m.

ows-bin

2005-11-0300:00:00
Copyright (C) 2000 Noam Rathaus
plugins.openvas.org
157

6.5 Medium

AI Score

Confidence

Low

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.008 Low

EPSS

Percentile

81.0%

Oracle

# SPDX-FileCopyrightText: 2000 Noam Rathaus
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.10348");
  script_version("2023-08-03T05:05:16+0000");
  script_tag(name:"last_modification", value:"2023-08-03 05:05:16 +0000 (Thu, 03 Aug 2023)");
  script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_cve_id("CVE-2000-0169");
  script_name("ows-bin");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2000 Noam Rathaus");
  script_family("Web application abuses");
  script_dependencies("find_service.nasl", "httpver.nasl", "global_settings.nasl");
  script_require_ports("Services/www", 80);
  script_exclude_keys("Settings/disable_cgi_scanning");

  script_xref(name:"URL", value:"http://www.securiteam.com/windowsntfocus/Oracle_Web_Listener_4_0_x_CGI_vulnerability.html");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/1053");

  script_tag(name:"solution", value:"If 'ows-bin' is the default CGI directory used by the Oracle Application Server Manager,
  then remove the ows-bin virtual directory or point it to a more benign directory.

  If 'ows-bin' is not the default then verify that there are no batch files in this directory.");

  script_tag(name:"summary", value:"Oracle's Web Listener (a component of the Oracle Application Server),
  is installed and can be used by a remote attacker to run arbitrary commands on the web server.");

  script_tag(name:"solution_type", value:"Workaround");
  script_tag(name:"qod_type", value:"remote_app");

  exit(0);
}

include("http_func.inc");
include("http_keepalive.inc");
include("port_service_func.inc");
include("list_array_func.inc");

port = http_get_port(default:80);

url = "/ows-bin/perlidlc.bat";
res = http_is_cgi_installed_ka(item:url, port:port);
if(!res)
  exit(0);

url = "/ows-bin/perlidlc.bat?&dir";
req = http_get(item:url, port:port);
res = http_keepalive_send_recv( port:port, data:req, bodyonly:FALSE );
if("ows-bin:" >< res) {
  report = http_report_vuln_url(port:port, url:url);
  security_message(port:port, data:report);
  exit(0);
}

exit(99);

6.5 Medium

AI Score

Confidence

Low

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.008 Low

EPSS

Percentile

81.0%

Related for OPENVAS:136141256231010348