[Openvas-commits] r6022 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Tue Dec 1 12:01:41 CET 2009


Author: mime
Date: 2009-12-01 12:01:39 +0100 (Tue, 01 Dec 2009)
New Revision: 6022

Added:
   trunk/openvas-plugins/scripts/PowerPhlogger_37150.nasl
   trunk/openvas-plugins/scripts/PowerPhlogger_detect.nasl
   trunk/openvas-plugins/scripts/asterisk_37153.nasl
   trunk/openvas-plugins/scripts/cacti_37137.nasl
   trunk/openvas-plugins/scripts/cups_37048.nasl
Modified:
   trunk/openvas-plugins/ChangeLog
   trunk/openvas-plugins/cve_current.txt
Log:
Added new plugins

Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2009-12-01 07:21:32 UTC (rev 6021)
+++ trunk/openvas-plugins/ChangeLog	2009-12-01 11:01:39 UTC (rev 6022)
@@ -1,3 +1,12 @@
+2009-12-01 Michael Meyer <michael.meyer at intevation.de>
+
+	* scripts/asterisk_37153.nasl,
+	scripts/PowerPhlogger_detect.nasl,
+	scripts/cacti_37137.nasl,
+	scripts/cups_37048.nasl,
+	scripts/PowerPhlogger_37150.nasl:
+	Added new plugins.
+
 2009-11-30  Chandrashekhar B <bchandra at secpod.com>
 
 	* scripts/secpod_frontaccounting_detect.nasl,

Modified: trunk/openvas-plugins/cve_current.txt
===================================================================
--- trunk/openvas-plugins/cve_current.txt	2009-12-01 07:21:32 UTC (rev 6021)
+++ trunk/openvas-plugins/cve_current.txt	2009-12-01 11:01:39 UTC (rev 6022)
@@ -316,3 +316,7 @@
 CVE-2009-4073			SecPod		svn		L
 CVE-2009-4071			SecPod		svn		L
 CVE-2009-4072			SecPod		svn		L
+CVE-2009-4055			Greenbone	svn		R
+37137				Greenbone	svn		R
+37048				Greenbone	svn		R
+37150				Greenbone	svn		R

Added: trunk/openvas-plugins/scripts/PowerPhlogger_37150.nasl
===================================================================
--- trunk/openvas-plugins/scripts/PowerPhlogger_37150.nasl	2009-12-01 07:21:32 UTC (rev 6021)
+++ trunk/openvas-plugins/scripts/PowerPhlogger_37150.nasl	2009-12-01 11:01:39 UTC (rev 6022)
@@ -0,0 +1,90 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# Power Phlogger Cross-site Scripting Vulnerability
+#
+# Authors:
+# Michael Meyer
+#
+# Copyright:
+# Copyright (c) 2009 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(100368);
+ script_bugtraq_id(37150);
+ script_version ("1.0-$Revision$");
+
+ script_name("Power Phlogger Cross-site Scripting Vulnerability");
+
+desc = "Overview:
+Power Phlogger is prone to a cross-site scripting vulnerability
+because the application fails to properly sanitize user-
+supplied input.
+
+Attackers can exploit this issue to steal cookie-based authentication
+credentials or to control how the site is rendered to the user.
+
+Power Phlogger 2.2.5 is vulnerable; other versions may also be
+affected.
+
+References:
+http://www.securityfocus.com/bid/37150
+http://www.websecurity.com.ua/1845
+http://www.phpee.com/
+
+Risk factor : Medium";
+
+ script_description(desc);
+ script_summary("Determine the PowerPhlogger version");
+ script_category(ACT_GATHER_INFO);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2009 Greenbone Networks GmbH");
+ script_dependencies("PowerPhlogger_detect.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+include("http_func.inc");
+include("http_keepalive.inc");
+include("version_func.inc");
+
+port = get_http_port(default:80);
+if(!get_port_state(port))exit(0);
+
+if (!can_host_php(port:port)) exit(0);
+
+if(!version = get_kb_item(string("www/", port, "/PowerPhlogger")))exit(0);
+if(!matches = eregmatch(string:version, pattern:"^(.+) under (/.*)$"))exit(0);
+
+vers = matches[1];
+
+if(!isnull(vers) && vers >!< "unknown") {
+
+  if(version_is_equal(version: vers, test_version: "2.2.5")   || 
+     version_is_equal(version: vers, test_version: "2.2.2.a") ||
+     version_is_equal(version: vers, test_version: "2.2.1")   ||
+     version_is_equal(version: vers, test_version: "2.0.9")) {
+        security_warning(port:port);
+        exit(0);
+  }
+
+}
+
+exit(0);


Property changes on: trunk/openvas-plugins/scripts/PowerPhlogger_37150.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Added: trunk/openvas-plugins/scripts/PowerPhlogger_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/PowerPhlogger_detect.nasl	2009-12-01 07:21:32 UTC (rev 6021)
+++ trunk/openvas-plugins/scripts/PowerPhlogger_detect.nasl	2009-12-01 11:01:39 UTC (rev 6022)
@@ -0,0 +1,110 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# PowerPhlogger Detection
+#
+# Authors:
+# Michael Meyer
+#
+# Copyright:
+# Copyright (c) 2009 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+# need desc here to modify it later in script.
+desc = "Overview:
+This host is running PowerPhlogger, a complete counter hosting tool.
+It lets you offer counter service to others from your site.
+
+See also:
+http://pphlogger.phpee.com/
+
+Risk factor : None";
+
+if (description)
+{
+ script_id(100367);
+ script_version ("1.0-$Revision$");
+ script_name("PowerPhlogger Detection");
+ script_description(desc);
+ script_summary("Checks for the presence of PowerPhlogger");
+ script_category(ACT_GATHER_INFO);
+ script_family("Service detection");
+ script_copyright("This script is Copyright (C) 2009 Greenbone Networks GmbH");
+ script_dependencies("find_service.nes", "http_version.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+
+include("http_func.inc");
+include("http_keepalive.inc");
+include("global_settings.inc");
+
+port = get_http_port(default:80);
+
+if(!get_port_state(port))exit(0);
+if(!can_host_php(port:port))exit(0);
+
+dirs = make_list("/weblogger","/pphlogger","/counter",cgi_dirs());
+
+foreach dir (dirs) {
+
+ url = string(dir, "/index.php");
+ req = http_get(item:url, port:port);
+ buf = http_keepalive_send_recv(port:port, data:req, bodyonly:FALSE);
+ if( buf == NULL )continue;
+
+ if(egrep(pattern: "POWER PHLOGGER [0-9.]+ - phpee.com", string: buf, icase: TRUE) ||
+    egrep(pattern: 'content="Power Phlogger', string: buf, icase: TRUE) )
+ {
+     if(strlen(dir)>0) {
+        install=dir;
+     } else {
+        install=string("/");
+     }
+
+    vers = string("unknown");
+    ### try to get version 
+    version = eregmatch(string: buf, pattern: "POWER PHLOGGER ([0-9.]+)",icase:FALSE);
+
+    if ( !isnull(version[1]) ) {
+       vers=chomp(version[1]);
+    }
+
+    set_kb_item(name: string("www/", port, "/PowerPhlogger"), value: string(vers," under ",install));
+
+    info = string("None\n\nPowerPhlogger Version '");
+    info += string(vers);
+    info += string("' was detected on the remote host in the following directory(s):\n\n");
+    info += string(install, "\n");
+
+    desc = ereg_replace(
+        string:desc,
+        pattern:"None$",
+        replace:info
+    );
+
+       if(report_verbosity > 0) {
+         security_note(port:port,data:desc);
+       }
+       exit(0);
+
+ }
+}
+exit(0);
+


Property changes on: trunk/openvas-plugins/scripts/PowerPhlogger_detect.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Added: trunk/openvas-plugins/scripts/asterisk_37153.nasl
===================================================================
--- trunk/openvas-plugins/scripts/asterisk_37153.nasl	2009-12-01 07:21:32 UTC (rev 6021)
+++ trunk/openvas-plugins/scripts/asterisk_37153.nasl	2009-12-01 11:01:39 UTC (rev 6022)
@@ -0,0 +1,80 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# Asterisk RTP Comfort Noise Processing Remote Denial of Service Vulnerability
+#
+# Authors:
+# Michael Meyer
+#
+# Copyright:
+# Copyright (c) 2009 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(100366);
+ script_bugtraq_id(37153);
+ script_cve_id("CVE-2009-4055");
+ script_version ("1.0-$Revision$");
+
+ script_name("Asterisk RTP Comfort Noise Processing Remote Denial of Service Vulnerability");
+
+desc = "Overview:
+Asterisk is prone to a remote denial-of-service vulnerability because
+it fails to properly handle malformed RTP comfort noise data.
+
+Successful exploits can crash the application, resulting in denial-of-
+service conditions for legitimate users.
+
+Solution:
+Updates are available. Please see the references for details.
+
+References:
+http://www.securityfocus.com/bid/37153
+http://www.asterisk.org/
+http://downloads.asterisk.org/pub/security/AST-2009-010.html
+
+Risk factor : Medium";
+
+ script_description(desc);
+ script_summary("Determine the Asterisk version");
+ script_category(ACT_GATHER_INFO);
+ script_family("General");
+ script_copyright("This script is Copyright (C) 2009 Greenbone Networks GmbH");
+ script_dependencies("secpod_asterisk_detect.nasl");
+ script_require_keys("Services/udp/sip");
+ exit(0);
+}
+
+include("version_func.inc");
+
+asterisk_port = get_kb_item("Services/udp/sip");
+if(!asterisk_port)exit(0);
+if(!get_udp_port_state(asterisk_port))exit(0);
+
+asteriskVer = get_kb_item("Asterisk-PBX/Ver");
+if(!asteriskVer){
+      exit(0);
+}
+
+if(version_in_range(version:asteriskVer, test_version:"1.6.1", test_version2:"1.6.1.10")  ||
+   version_in_range(version:asteriskVer, test_version:"1.4.27", test_version2:"1.4.27.0") ||
+   version_in_range(version:asteriskVer, test_version:"1.2", test_version2:"1.2.36")) {
+      security_warning(port:asterisk_port, proto:"udp");
+}   
+
+exit(0);


Property changes on: trunk/openvas-plugins/scripts/asterisk_37153.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Added: trunk/openvas-plugins/scripts/cacti_37137.nasl
===================================================================
--- trunk/openvas-plugins/scripts/cacti_37137.nasl	2009-12-01 07:21:32 UTC (rev 6021)
+++ trunk/openvas-plugins/scripts/cacti_37137.nasl	2009-12-01 11:01:39 UTC (rev 6022)
@@ -0,0 +1,84 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# Cacti 'Linux - Get Memory Usage' Remote Command Execution Vulnerability
+#
+# Authors:
+# Michael Meyer
+#
+# Copyright:
+# Copyright (c) 2009 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(100365);
+ script_bugtraq_id(37137);
+ script_cve_id("CVE-2009-4112");
+ script_version ("1.0-$Revision$");
+
+ script_name("Cacti 'Linux - Get Memory Usage' Remote Command Execution Vulnerability");
+
+desc = "Overview:
+Cacti is prone to a remote command-execution vulnerability because the
+software fails to adequately sanitize user-supplied input.
+
+Successful attacks can compromise the affected software and possibly
+the computer.
+
+References:
+http://www.securityfocus.com/bid/37137
+http://archives.neohapsis.com/archives/fulldisclosure/2009-11/0292.html
+http://cacti.net/
+
+Risk factor : Medium";
+
+ script_description(desc);
+ script_summary("Determine the cacti version");
+ script_category(ACT_GATHER_INFO);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2009 Greenbone Networks GmbH");
+ script_dependencies("cacti_detect.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+
+include("http_func.inc");
+include("version_func.inc");
+
+port = get_http_port(default:80);
+if(!get_port_state(port))exit(0);
+
+if(!can_host_php(port:port)) exit(0);
+
+if(!version = get_kb_item(string("www/", port, "/cacti")))exit(0);
+if(!matches = eregmatch(string:version, pattern:"^(.+) under (/.*)$"))exit(0);
+
+vers = matches[1];
+
+if(!isnull(vers) && vers >!< "unknown") {
+
+  if(version_is_less(version: vers, test_version: "0.8.7e")) {
+     security_warning(port:port);
+     exit(0);
+   }  
+
+} 
+
+exit(0);


Property changes on: trunk/openvas-plugins/scripts/cacti_37137.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Added: trunk/openvas-plugins/scripts/cups_37048.nasl
===================================================================
--- trunk/openvas-plugins/scripts/cups_37048.nasl	2009-12-01 07:21:32 UTC (rev 6021)
+++ trunk/openvas-plugins/scripts/cups_37048.nasl	2009-12-01 11:01:39 UTC (rev 6022)
@@ -0,0 +1,84 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# CUPS File Descriptors Handling Remote Denial Of Service Vulnerability
+#
+# Authors:
+# Michael Meyer
+#
+# Copyright:
+# Copyright (c) 2009 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(100369);
+ script_bugtraq_id(37048);
+ script_cve_id("CVE-2009-3553");
+ script_version ("1.0-$Revision$");
+
+ script_name("CUPS File Descriptors Handling Remote Denial Of Service Vulnerability");
+
+desc = "Overview:
+CUPS is prone to a denial-of-service vulnerability.
+
+A remote attacker can exploit this issue to crash the affected
+application, denying service to legitimate users.
+
+This issue affects CUPS 1.3.7; other versions may be vulnerable as
+well.
+
+Solution:
+Updates are available. Please see the references for details.
+
+References:
+http://www.securityfocus.com/bid/37048
+http://www.cups.org
+https://bugzilla.redhat.com/show_bug.cgi?id=530111
+
+Risk factor : Medium";
+
+ script_description(desc);
+ script_summary("Determine if CUPS version is 1.3.7");
+ script_category(ACT_GATHER_INFO);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2009 Greenbone Networks GmbH");
+ script_dependencies("secpod_cups_detect.nasl");
+ script_require_ports("Services/www", 631);
+ exit(0);
+}
+
+include("http_func.inc");
+include("version_func.inc");
+
+cupsPort = get_http_port(default:631);
+if(!cupsPort){
+  exit(0);
+}
+
+cupsVer = get_kb_item("www/"+ cupsPort + "/CUPS");
+if(!cupsVer){
+  exit(0);
+}
+
+if(cupsVer != NULL)
+{
+  # Check for CUPS version < 1.4.2
+  if(version_is_equal(version:cupsVer, test_version:"1.3.7")){
+    security_warning(cupsPort);
+  }
+}


Property changes on: trunk/openvas-plugins/scripts/cups_37048.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision



More information about the Openvas-commits mailing list