ID OPENVAS:1361412562310106669 Type openvas Reporter Copyright (C) 2017 Greenbone Networks GmbH Modified 2020-04-02T00:00:00
Description
b2evolution is prone to a unrestricted file upload vulnerability.
###############################################################################
# OpenVAS Vulnerability Test
#
# b2evolution File Upload Vulnerability
#
# Authors:
# Christian Kuersteiner <christian.kuersteiner@greenbone.net>
#
# Copyright:
# Copyright (C) 2017 Greenbone Networks GmbH
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
if (description)
{
script_oid("1.3.6.1.4.1.25623.1.0.106669");
script_version("2020-04-02T11:36:28+0000");
script_tag(name:"last_modification", value:"2020-04-02 11:36:28 +0000 (Thu, 02 Apr 2020)");
script_tag(name:"creation_date", value:"2017-03-17 15:44:20 +0700 (Fri, 17 Mar 2017)");
script_tag(name:"cvss_base", value:"6.5");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:S/C:P/I:P/A:P");
script_tag(name:"qod_type", value:"remote_banner");
script_tag(name:"solution_type", value:"WillNotFix");
script_name("b2evolution File Upload Vulnerability");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2017 Greenbone Networks GmbH");
script_family("Web application abuses");
script_tag(name:"summary", value:"b2evolution is prone to a unrestricted file upload vulnerability.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"Unrestricted file upload vulnerability in 'file upload' modules in
b2evolution CMS allows authenticated user to upload malicious code (shell), even though in the system has
restricted extension (php).");
script_tag(name:"affected", value:"b2evolution 6.8.8.");
script_tag(name:"solution", value:"No known solution was made available for at least one year since the disclosure
of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer
release, disable respective features, remove the product or replace the product by another one.");
script_xref(name:"URL", value:"https://rungga.blogspot.co.id/2017/03/remote-file-upload-vulnerability-in.html");
script_tag(name:"deprecated", value: TRUE); # Deprecated since CVE-2017-6902 has been REJECTED
exit(0);
}
exit(66);
{"id": "OPENVAS:1361412562310106669", "type": "openvas", "bulletinFamily": "scanner", "title": "b2evolution File Upload Vulnerability", "description": "b2evolution is prone to a unrestricted file upload vulnerability.", "published": "2017-03-17T00:00:00", "modified": "2020-04-02T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310106669", "reporter": "Copyright (C) 2017 Greenbone Networks GmbH", "references": ["https://rungga.blogspot.co.id/2017/03/remote-file-upload-vulnerability-in.html"], "cvelist": ["CVE-2017-6902"], "lastseen": "2020-04-07T16:39:36", "viewCount": 1, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2017-6902"]}], "modified": "2020-04-07T16:39:36", "rev": 2}, "score": {"value": 5.9, "vector": "NONE", "modified": "2020-04-07T16:39:36", "rev": 2}, "vulnersScore": 5.9}, "pluginID": "1361412562310106669", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# b2evolution File Upload Vulnerability\n#\n# Authors:\n# Christian Kuersteiner <christian.kuersteiner@greenbone.net>\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif (description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.106669\");\n script_version(\"2020-04-02T11:36:28+0000\");\n script_tag(name:\"last_modification\", value:\"2020-04-02 11:36:28 +0000 (Thu, 02 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2017-03-17 15:44:20 +0700 (Fri, 17 Mar 2017)\");\n script_tag(name:\"cvss_base\", value:\"6.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n\n script_tag(name:\"qod_type\", value:\"remote_banner\");\n\n script_tag(name:\"solution_type\", value:\"WillNotFix\");\n\n script_name(\"b2evolution File Upload Vulnerability\");\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"Web application abuses\");\n\n script_tag(name:\"summary\", value:\"b2evolution is prone to a unrestricted file upload vulnerability.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Unrestricted file upload vulnerability in 'file upload' modules in\n b2evolution CMS allows authenticated user to upload malicious code (shell), even though in the system has\n restricted extension (php).\");\n\n script_tag(name:\"affected\", value:\"b2evolution 6.8.8.\");\n\n script_tag(name:\"solution\", value:\"No known solution was made available for at least one year since the disclosure\n of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer\n release, disable respective features, remove the product or replace the product by another one.\");\n\n script_xref(name:\"URL\", value:\"https://rungga.blogspot.co.id/2017/03/remote-file-upload-vulnerability-in.html\");\n\n script_tag(name:\"deprecated\", value: TRUE); # Deprecated since CVE-2017-6902 has been REJECTED\n\n exit(0);\n}\n\nexit(66);\n", "naslFamily": "Web application abuses", "immutableFields": []}
{"cve": [{"lastseen": "2020-10-03T13:07:47", "description": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", "edition": 2, "cvss3": {}, "published": "2017-03-14T21:59:00", "title": "CVE-2017-6902", "type": "cve", "cwe": [], "bulletinFamily": "NVD", "cvss2": {}, "cvelist": ["CVE-2017-6902"], "modified": "2017-03-18T01:59:00", "cpe": [], "id": "CVE-2017-6902", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6902", "cvss": {"score": 0.0, "vector": "NONE"}, "cpe23": []}]}