JAG (Just Another Guestbook) Information Disclosure Vulnerability
2010-02-26T00:00:00
ID OPENVAS:1361412562310900745 Type openvas Reporter Copyright (C) 2010 SecPod Modified 2020-05-08T00:00:00
Description
The host is running JAG and is prone to Information Disclosure
vulnerability.
###############################################################################
# OpenVAS Vulnerability Test
#
# JAG (Just Another Guestbook) Information Disclosure Vulnerability
#
# Authors:
# Rachana Shetty <srachana@secpod.com>
#
# Copyright:
# Copyright (C) 2010 SecPod, http://www.secpod.com
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.900745");
script_version("2020-05-08T08:34:44+0000");
script_tag(name:"last_modification", value:"2020-05-08 08:34:44 +0000 (Fri, 08 May 2020)");
script_tag(name:"creation_date", value:"2010-02-26 10:13:54 +0100 (Fri, 26 Feb 2010)");
script_tag(name:"cvss_base", value:"5.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:N/A:N");
script_cve_id("CVE-2010-0665");
script_name("JAG (Just Another Guestbook) Information Disclosure Vulnerability");
script_tag(name:"qod_type", value:"remote_banner");
script_copyright("Copyright (C) 2010 SecPod");
script_category(ACT_MIXED_ATTACK);
script_family("Web application abuses");
script_dependencies("secpod_jag_detect.nasl");
script_require_ports("Services/www", 80);
script_mandatory_keys("xs4all/jag/detected");
script_tag(name:"impact", value:"Successful exploitation will allow remote attackers to download the backup
database and obtain sensitive information.");
script_tag(name:"affected", value:"JAG (Just Another Guestbook) version 1.14 and prior.");
script_tag(name:"insight", value:"The flaw is caused by improper restrictions on the 'database.sql file'. By
sending a direct request, this can exploited to download the backup database.");
script_tag(name:"solution", value:"No known solution was made available for at least one year since the disclosure
of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer
release, disable respective features, remove the product or replace the product by another one.");
script_tag(name:"summary", value:"The host is running JAG and is prone to Information Disclosure
vulnerability.");
script_tag(name:"solution_type", value:"WillNotFix");
script_xref(name:"URL", value:"http://xforce.iss.net/xforce/xfdb/56228");
script_xref(name:"URL", value:"http://www.exploit-db.com/exploits/11406");
exit(0);
}
include("http_func.inc");
include("version_func.inc");
jagPort = http_get_port(default:80);
jagVer = get_kb_item("www/" + jagPort + "/JAG");
if(isnull(jagVer))
exit(0);
jagVer = eregmatch(pattern:"^(.+) under (/.*)$", string:jagVer);
if(!safe_checks() && jagVer[2] != NULL)
{
url = string(jagVer[2], "/database.sql");
sndReq = http_get(item:url, port:jagPort);
rcvRes = http_send_recv(port:jagPort, data:sndReq);
if(!isnull(rcvRes) && ("create table guestbook" >< rcvRes))
{
report = http_report_vuln_url(port:jagPort, url:url);
security_message(port:jagPort, data:report);
exit(0);
}
}
if(jagVer[1] != NULL)
{
if(version_is_less_equal(version:jagVer[1], test_version:"1.14")){
security_message(jagPort);
}
}
{"id": "OPENVAS:1361412562310900745", "type": "openvas", "bulletinFamily": "scanner", "title": "JAG (Just Another Guestbook) Information Disclosure Vulnerability", "description": "The host is running JAG and is prone to Information Disclosure\n vulnerability.", "published": "2010-02-26T00:00:00", "modified": "2020-05-08T00:00:00", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310900745", "reporter": "Copyright (C) 2010 SecPod", "references": ["http://www.exploit-db.com/exploits/11406", "http://xforce.iss.net/xforce/xfdb/56228"], "cvelist": ["CVE-2010-0665"], "lastseen": "2020-05-12T17:33:18", "viewCount": 4, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2010-0665"]}, {"type": "exploitdb", "idList": ["EDB-ID:11406"]}, {"type": "openvas", "idList": ["OPENVAS:900745"]}], "modified": "2020-05-12T17:33:18", "rev": 2}, "score": {"value": 5.5, "vector": "NONE", "modified": "2020-05-12T17:33:18", "rev": 2}, "vulnersScore": 5.5}, "pluginID": "1361412562310900745", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# JAG (Just Another Guestbook) Information Disclosure Vulnerability\n#\n# Authors:\n# Rachana Shetty <srachana@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2010 SecPod, http://www.secpod.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.900745\");\n script_version(\"2020-05-08T08:34:44+0000\");\n script_tag(name:\"last_modification\", value:\"2020-05-08 08:34:44 +0000 (Fri, 08 May 2020)\");\n script_tag(name:\"creation_date\", value:\"2010-02-26 10:13:54 +0100 (Fri, 26 Feb 2010)\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_cve_id(\"CVE-2010-0665\");\n script_name(\"JAG (Just Another Guestbook) Information Disclosure Vulnerability\");\n script_tag(name:\"qod_type\", value:\"remote_banner\");\n script_copyright(\"Copyright (C) 2010 SecPod\");\n script_category(ACT_MIXED_ATTACK);\n script_family(\"Web application abuses\");\n script_dependencies(\"secpod_jag_detect.nasl\");\n script_require_ports(\"Services/www\", 80);\n script_mandatory_keys(\"xs4all/jag/detected\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote attackers to download the backup\n database and obtain sensitive information.\");\n\n script_tag(name:\"affected\", value:\"JAG (Just Another Guestbook) version 1.14 and prior.\");\n\n script_tag(name:\"insight\", value:\"The flaw is caused by improper restrictions on the 'database.sql file'. By\n sending a direct request, this can exploited to download the backup database.\");\n\n script_tag(name:\"solution\", value:\"No known solution was made available for at least one year since the disclosure\n of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer\n release, disable respective features, remove the product or replace the product by another one.\");\n\n script_tag(name:\"summary\", value:\"The host is running JAG and is prone to Information Disclosure\n vulnerability.\");\n\n script_tag(name:\"solution_type\", value:\"WillNotFix\");\n\n script_xref(name:\"URL\", value:\"http://xforce.iss.net/xforce/xfdb/56228\");\n script_xref(name:\"URL\", value:\"http://www.exploit-db.com/exploits/11406\");\n\n exit(0);\n}\n\ninclude(\"http_func.inc\");\ninclude(\"version_func.inc\");\n\njagPort = http_get_port(default:80);\n\njagVer = get_kb_item(\"www/\" + jagPort + \"/JAG\");\nif(isnull(jagVer))\n exit(0);\n\njagVer = eregmatch(pattern:\"^(.+) under (/.*)$\", string:jagVer);\nif(!safe_checks() && jagVer[2] != NULL)\n{\n url = string(jagVer[2], \"/database.sql\");\n sndReq = http_get(item:url, port:jagPort);\n rcvRes = http_send_recv(port:jagPort, data:sndReq);\n if(!isnull(rcvRes) && (\"create table guestbook\" >< rcvRes))\n {\n report = http_report_vuln_url(port:jagPort, url:url);\n security_message(port:jagPort, data:report);\n exit(0);\n }\n}\n\nif(jagVer[1] != NULL)\n{\n if(version_is_less_equal(version:jagVer[1], test_version:\"1.14\")){\n security_message(jagPort);\n }\n}\n", "naslFamily": "Web application abuses", "immutableFields": []}
{"cve": [{"lastseen": "2021-02-02T05:44:56", "description": "JAG (Just Another Guestbook) 1.14 stores sensitive information under the web root with insufficient access control, which allows remote attackers to obtain sensitive information via a direct request for jag/database.sql.", "edition": 4, "cvss3": {}, "published": "2010-02-19T17:30:00", "title": "CVE-2010-0665", "type": "cve", "cwe": ["CWE-264"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-0665"], "modified": "2017-08-17T01:32:00", "cpe": ["cpe:/a:xs4all:jag:1.14"], "id": "CVE-2010-0665", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0665", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:a:xs4all:jag:1.14:*:*:*:*:*:*:*"]}], "openvas": [{"lastseen": "2017-07-02T21:09:57", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-0665"], "description": "The host is running JAG and is prone to Information Disclosure\n vulnerability.", "modified": "2017-02-22T00:00:00", "published": "2010-02-26T00:00:00", "id": "OPENVAS:900745", "href": "http://plugins.openvas.org/nasl.php?oid=900745", "type": "openvas", "title": "JAG (Just Another Guestbook) Information Disclosure Vulnerability", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: secpod_jag_info_disc_vuln.nasl 5394 2017-02-22 09:22:42Z teissa $\n#\n# JAG (Just Another Guestbook) Information Disclosure Vulnerability\n#\n# Authors:\n# Rachana Shetty <srachana@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2010 SecPod, http://www.secpod.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation will allow remote attackers to download the backup\ndatabase and obtain sensitive information.\n\nImpact Level: Application\";\ntag_affected = \"JAG (Just Another Guestbook) version 1.14 and prior.\";\ntag_insight = \"The flaw is caused by improper restrictions on the 'database.sql file'. By\nsending a direct request, this can exploited to download the backup database.\";\ntag_solution = \"No solution or patch was made available for at least one year\nsince disclosure of this vulnerability. Likely none will be provided anymore.\nGeneral solution options are to upgrade to a newer release, disable respective\nfeatures, remove the product or replace the product by another one.\";\ntag_summary = \"The host is running JAG and is prone to Information Disclosure\n vulnerability.\";\n\nif(description)\n{\n script_id(900745);\n script_version(\"$Revision: 5394 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-02-22 10:22:42 +0100 (Wed, 22 Feb 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-02-26 10:13:54 +0100 (Fri, 26 Feb 2010)\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_cve_id(\"CVE-2010-0665\");\n script_name(\"JAG (Just Another Guestbook) Information Disclosure Vulnerability\");\n\n\n script_tag(name:\"qod_type\", value:\"remote_banner\");\n script_copyright(\"Copyright (C) 2010 SecPod\");\n script_category(ACT_MIXED_ATTACK);\n script_family(\"Web application abuses\");\n script_dependencies(\"secpod_jag_detect.nasl\");\n script_require_ports(\"Services/www\", 80);\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"solution_type\", value:\"WillNotFix\");\n script_xref(name : \"URL\" , value : \"http://xforce.iss.net/xforce/xfdb/56228\");\n script_xref(name : \"URL\" , value : \"http://www.exploit-db.com/exploits/11406\");\n exit(0);\n}\n\n\ninclude(\"http_func.inc\");\ninclude(\"version_func.inc\");\n\njagPort = get_http_port(default:80);\nif(!jagPort){\n exit(0);\n}\n\njagVer = get_kb_item(\"www/\" + jagPort + \"/JAG\");\nif(isnull(jagVer)){\n exit(0);\n}\n\njagVer = eregmatch(pattern:\"^(.+) under (/.*)$\", string:jagVer);\nif(!safe_checks() && jagVer[2] != NULL)\n{\n sndReq = http_get(item:string(jagVer[2], \"/database.sql\"), port:jagPort);\n rcvRes = http_send_recv(port:jagPort, data:sndReq);\n if(!isnull(rcvRes) && (\"create table guestbook\" >< rcvRes))\n {\n security_message(jagPort);\n exit(0);\n }\n}\n\nif(jagVer[1] != NULL)\n{\n if(version_is_less_equal(version:jagVer[1], test_version:\"1.14\")){\n security_message(jagPort);\n }\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}], "exploitdb": [{"lastseen": "2016-02-01T14:14:55", "description": "J.A.G (Just Another Guestbook) Database Disclosure Vulnerability. CVE-2010-0665. Webapps exploit for windows platform", "published": "2010-02-11T00:00:00", "type": "exploitdb", "title": "J.A.G Just Another Guestbook 1.14 - Database Disclosure Vulnerability", "bulletinFamily": "exploit", "cvelist": ["CVE-2010-0665"], "modified": "2010-02-11T00:00:00", "id": "EDB-ID:11406", "href": "https://www.exploit-db.com/exploits/11406/", "sourceData": "# Software Link: http://www.xs4all.nl/~crisp/jag/jag.zip\r\n# Version: v1.14\r\n# Tested on: Windows xp sp3\r\n \r\n\r\n------------------------------------------------------\r\n\r\n _____ _ \r\n| __ \\| | \r\n| |__) | |__ ___ _ __ ___ _ __ ___ \r\n| ___/| '_ \\ / _ \\ '_ \\ / _/\\| '_ ` _ \\ \r\n| | | | | | __/ | | | (_) | | | | | |\r\n|_| |_| |_|\\___|_| |_|\\/__/|_| |_| |_|\r\n\r\n\r\n------------------------------------------------------\r\n\r\n####### J.A.G (Just Another Guestbook) Database Disclosure Vulnerability #######\r\n#\r\n# Author : Phenom\r\n#\r\n# app version : 1.14\r\n#\r\n#################################################################################\r\n\r\n####### Exploit #################################################################\r\n#\r\n# http://site.com/path/jag/database.sql\r\n#\r\n#################################################################################", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "sourceHref": "https://www.exploit-db.com/download/11406/"}]}