Lucene search

K

Greymatter gm.cgi HTML injection flaw

🗓️ 26 Mar 2006 00:00:00Reported by This script is Copyright (C) 2005 David MaciejakType 
openvas
 openvas
🔗 plugins.openvas.org👁 9 Views

The remote host is using Greymatter, an opensource weblogging and journal software written in perl. A vulnerability exists in this version which may allow an attacker to execute arbitrary HTML and script code in the context of the user's browser

Show more
Related
Code
ReporterTitlePublishedViews
Family
Tenable Nessus
Greymatter Comment Name Field Control Panel Log XSS
19 Sep 200500:00
nessus
CVE
CVE-2005-2816
7 Sep 200519:07
cve
Cvelist
CVE-2005-2816
7 Sep 200504:00
cvelist
NVD
CVE-2005-2816
7 Sep 200519:07
nvd
OpenVAS
Greymatter gm.cgi HTML injection flaw
26 Mar 200600:00
openvas
# OpenVAS Vulnerability Test
# $Id: greymatter_html_inject.nasl 5781 2017-03-30 08:15:57Z cfi $
# Description: Greymatter gm.cgi HTML injection flaw
#
# Authors:
# David Maciejak <david dot maciejak at kyxar dot fr>
#
# Copyright:
# Copyright (C) 2005 David Maciejak
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2,
# as published by the Free Software Foundation
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
#

tag_summary = "The remote host is using Greymatter, an opensource weblogging and 
journal software written in perl.

A vulnerability exists in this version which may allow 
an attacker to execute arbitrary HTML and script code in
the context of the user's browser.";

tag_solution = "Upgrade to the latest version of this software";

#  Ref: [email protected]

if(description)
{
 script_id(19752);
 script_version("$Revision: 5781 $");
 script_tag(name:"last_modification", value:"$Date: 2017-03-30 10:15:57 +0200 (Thu, 30 Mar 2017) $");
 script_tag(name:"creation_date", value:"2006-03-26 17:55:15 +0200 (Sun, 26 Mar 2006)");
 script_cve_id("CVE-2005-2816");
 script_bugtraq_id(14703);
 script_tag(name:"cvss_base", value:"4.3");
 script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:N/I:P/A:N");
 script_name("Greymatter gm.cgi HTML injection flaw");
 script_category(ACT_GATHER_INFO);
 script_tag(name:"qod_type", value:"remote_banner");
 script_copyright("This script is Copyright (C) 2005 David Maciejak");
 script_family("Web application abuses");
 script_dependencies("find_service.nasl", "http_version.nasl");
 script_require_ports("Services/www", 80);
 script_exclude_keys("Settings/disable_cgi_scanning");
 script_tag(name : "solution" , value : tag_solution);
 script_tag(name : "summary" , value : tag_summary);
 exit(0);
}

include("http_func.inc");
include("http_keepalive.inc");

port = get_http_port(default:80);

foreach dir( make_list_unique( "/greymatter", cgi_dirs( port:port ) ) ) {

  if( dir == "/" ) dir = "";
  url = string(dir, "/gm.cgi");

  if(http_vuln_check(port:port, url:url,pattern:'<META NAME="Generator" CONTENT="Greymatter (0\\.|1\\.([0-2][0-9]*[a-z]?|3|3\\.[01]))">')) {
    report = report_vuln_url( port:port, url:url );
    security_message( port:port, data:report );
    exit( 0 );
  }
}

exit( 99 );

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
26 Mar 2006 00:00Current
0.2Low risk
Vulners AI Score0.2
EPSS0.0014
9
.json
Report