Lucene search

K
openvasCopyright (C) 2011 Greenbone AGOPENVAS:1361412562310802311
HistoryJul 19, 2011 - 12:00 a.m.

Chyrp < 2.1.1 Multiple Vulnerabilities

2011-07-1900:00:00
Copyright (C) 2011 Greenbone AG
plugins.openvas.org
8

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

6.8 Medium

AI Score

Confidence

Low

0.021 Low

EPSS

Percentile

89.1%

Chyrp is prone to multiple vulnerabilities.

# SPDX-FileCopyrightText: 2011 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.802311");
  script_version("2023-12-13T05:05:23+0000");
  script_tag(name:"last_modification", value:"2023-12-13 05:05:23 +0000 (Wed, 13 Dec 2023)");
  script_tag(name:"creation_date", value:"2011-07-19 14:57:20 +0200 (Tue, 19 Jul 2011)");
  script_cve_id("CVE-2011-2743");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:N/I:P/A:N");
  script_name("Chyrp < 2.1.1 Multiple Vulnerabilities");
  script_category(ACT_ATTACK);
  script_copyright("Copyright (C) 2011 Greenbone AG");
  script_family("Web application abuses");
  script_dependencies("find_service.nasl", "no404.nasl", "webmirror.nasl", "DDI_Directory_Scanner.nasl", "gb_php_http_detect.nasl", "global_settings.nasl");
  script_require_ports("Services/www", 80);
  script_exclude_keys("Settings/disable_cgi_scanning");

  script_xref(name:"URL", value:"http://packetstormsecurity.org/files/view/103098/oCERT-2011-001-JAHx113.txt");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/48672");

  script_tag(name:"summary", value:"Chyrp is prone to multiple vulnerabilities.");

  script_tag(name:"vuldetect", value:"Sends a crafted HTTP GET request and checks the response.");

  script_tag(name:"insight", value:"The following flaws exist:

  - Insufficient input sanitisation on the parameters passed to pages related to administration
  settings, the javascript handler and the index handler leads to arbitrary javascript injection in
  the context of the user session.

  - Insufficient path sanitisation on the root 'action' query string parameter.

  - 'title' and 'body' parameters are not initialised in the 'admin/help.php' file resulting in
  cross-site scripting (XSS).");

  script_tag(name:"impact", value:"Successful exploitation will allow attacker to hijack the session
  of the administrator or to read arbitrary accessible files or to gain sensitive information by
  executing arbitrary scripts.");

  script_tag(name:"affected", value:"Chyrp version prior to 2.1.1.");

  script_tag(name:"solution", value:"Update to version 2.1.1 or later.");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"remote_analysis");

  exit(0);
}

include("http_func.inc");
include("http_keepalive.inc");
include("port_service_func.inc");
include("list_array_func.inc");

port = http_get_port(default:80);

if(!http_can_host_php(port:port))
  exit(0);

foreach dir(make_list_unique("/blog", "/chyrp", "/", http_cgi_dirs(port:port))) {

  if(dir == "/")
    dir = "";

  res = http_get_cache(item:dir + "/", port:port);

  if("Powered by" >< res && ">Chyrp<" >< res) {
    url = dir + '/admin/help.php?title="><script>alert(document.cookie);</script>';
    req = http_get(item:url, port:port);
    res = http_keepalive_send_recv(port:port, data:req);
    if(res =~ "^HTTP/1\.[01] 200" && '"><script>alert(document.cookie);</script>"' >< res) {
      report = http_report_vuln_url(port:port, url:url);
      security_message(port:port, data:report);
      exit(0);
    }
  }
}

exit(99);

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

6.8 Medium

AI Score

Confidence

Low

0.021 Low

EPSS

Percentile

89.1%

Related for OPENVAS:1361412562310802311