Lucene search

K
openvasCopyright (C) 2017 Greenbone Networks GmbHOPENVAS:1361412562310140609
HistoryDec 19, 2017 - 12:00 a.m.

GoAhead Server RCE Vulnerability

2017-12-1900:00:00
Copyright (C) 2017 Greenbone Networks GmbH
plugins.openvas.org
565

0.975 High

EPSS

Percentile

99.9%

Embedthis GoAhead is prone to a remote code execution vulnerability.

###############################################################################
# OpenVAS Vulnerability Test
#
# GoAhead Server RCE Vulnerability
#
# Authors:
# Christian Kuersteiner <[email protected]>
#
# Copyright:
# Copyright (c) 2017 Greenbone Networks GmbH
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 2 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################

if (description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.140609");
  script_version("2019-12-18T08:24:18+0000");
  script_tag(name:"last_modification", value:"2019-12-18 08:24:18 +0000 (Wed, 18 Dec 2019)");
  script_tag(name:"creation_date", value:"2017-12-19 08:55:23 +0700 (Tue, 19 Dec 2017)");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:P/I:P/A:P");

  script_cve_id("CVE-2017-17562");

  script_tag(name:"qod_type", value:"remote_analysis");

  script_tag(name:"solution_type", value:"VendorFix");

  script_name("GoAhead Server RCE Vulnerability");

  script_category(ACT_GATHER_INFO);

  script_copyright("Copyright (C) 2017 Greenbone Networks GmbH");
  script_family("Web application abuses");
  script_dependencies("gb_goahead_detect.nasl");
  script_require_ports("Services/www", 80);
  script_mandatory_keys("embedthis/goahead/detected");

  script_tag(name:"summary", value:"Embedthis GoAhead is prone to a remote code execution vulnerability.");

  script_tag(name:"insight", value:"Embedthis GoAhead allows remote code execution if CGI is enabled and a CGI
  program is dynamically linked. This is a result of initializing the environment of forked CGI scripts using
  untrusted HTTP request parameters in the cgiHandler function in cgi.c. When combined with the glibc dynamic
  linker, this behaviour can be abused for remote code execution using special parameter names such as LD_PRELOAD.
  An attacker can POST their shared object payload in the body of the request, and reference it using
  /proc/self/fd/0.");

  script_tag(name:"impact", value:"An unauthenticated attacker may execute arbitrary code.");

  script_tag(name:"vuldetect", value:"Checks if CGI scripting is enabled.");

  script_tag(name:"affected", value:"GoAhead versions prior to 3.6.5.");

  script_tag(name:"solution", value:"Updated to version 3.6.5 or later. As a migitation step disable CGI
support.");

  script_xref(name:"URL", value:"https://www.elttam.com.au/blog/goahead/");
  script_xref(name:"URL", value:"https://github.com/embedthis/goahead/issues/249");
  script_xref(name:"URL", value:"https://www.exploit-db.com/exploits/43360/");

  exit(0);
}

CPE = "cpe:/a:embedthis:goahead";

include("http_func.inc");
include("host_details.inc");
include("http_keepalive.inc");

if(!port = get_app_port(cpe: CPE)) exit(0);
get_app_location(cpe: CPE, port: port);

url = '/cgi-bin/c8fed00eb2e87f1cee8e90ebbe870c190ac3848c';

if (http_vuln_check(port: port, url: url, pattern: "CGI process file does not exist", check_header: TRUE)) {
  report = "CGI scripting is enabled.";
  security_message(port: port, data: report);
  exit(0);
}

exit(0);