[Openvas-commits] r6041 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Wed Dec 2 19:43:31 CET 2009


Author: mime
Date: 2009-12-02 19:43:26 +0100 (Wed, 02 Dec 2009)
New Revision: 6041

Added:
   trunk/openvas-plugins/scripts/adaptcms_33698.nasl
   trunk/openvas-plugins/scripts/phpmyfaq_37180.nasl
Modified:
   trunk/openvas-plugins/ChangeLog
   trunk/openvas-plugins/cve_current.txt
   trunk/openvas-plugins/scripts/simple_machines_forum_37182.nasl
Log:
Added new plugins

Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2009-12-02 18:07:18 UTC (rev 6040)
+++ trunk/openvas-plugins/ChangeLog	2009-12-02 18:43:26 UTC (rev 6041)
@@ -1,5 +1,14 @@
 2009-12-02 Michael Meyer <michael.meyer at intevation.de>
 
+	* * scripts/phpmyfaq_37180.nasl,
+	scripts/adaptcms_33698.nasl:
+	Added new plugins.
+
+	* scripts/simple_machines_forum_37182.nasl:
+	Changed security_warning() to security_hole().
+
+2009-12-02 Michael Meyer <michael.meyer at intevation.de>
+
 	* scripts/simple_machines_forum_37182.nasl,
 	scripts/ISPworker_26277.nasl:
 	Added new plugins.

Modified: trunk/openvas-plugins/cve_current.txt
===================================================================
--- trunk/openvas-plugins/cve_current.txt	2009-12-02 18:07:18 UTC (rev 6040)
+++ trunk/openvas-plugins/cve_current.txt	2009-12-02 18:43:26 UTC (rev 6041)
@@ -327,3 +327,5 @@
 CVE-2009-4105			SecPod		svn		R
 CVE-2009-4108			SecPod		svn		R
 37182				Greenbone	svn		R
+37180				Greenbone	svn		R
+33698				Greenbone	svn		R

Added: trunk/openvas-plugins/scripts/adaptcms_33698.nasl
===================================================================
--- trunk/openvas-plugins/scripts/adaptcms_33698.nasl	2009-12-02 18:07:18 UTC (rev 6040)
+++ trunk/openvas-plugins/scripts/adaptcms_33698.nasl	2009-12-02 18:43:26 UTC (rev 6041)
@@ -0,0 +1,100 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# AdaptCMS Lite Cross Site Scripting and Remote File Include Vulnerabilities
+#
+# Authors:
+# Michael Meyer
+#
+# Copyright:
+# Copyright (c) 2009 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(100373);
+ script_bugtraq_id(33698);
+ script_version ("1.0-$Revision$");
+
+ script_name("AdaptCMS Lite Cross Site Scripting and Remote File Include Vulnerabilities");
+
+desc = "Overview:
+AdaptCMS Lite is prone to multiple cross-site scripting
+vulnerabilities and a remote file-include vulnerability because it
+fails to sufficiently sanitize user-supplied data.
+
+An attacker can exploit these issues to execute malicious PHP code
+in the context of the webserver process. This may allow the attacker
+to compromise the application and the underlying system. The
+attacker may also execute script code in an unsuspecting user's
+browser or steal cookie-based authentication credentials; other
+attacks are also possible.
+
+AdaptCMS Lite 1.4 and 1.5 are vulnerable; other versions may also
+be affected.
+
+References:
+http://www.securityfocus.com/bid/33698
+http://www.adaptcms.com
+
+Risk factor : Medium";
+
+ script_description(desc);
+ script_summary("Determine if AdaptCMS Lite is prone to multiple vulnerabilities");
+ script_category(ACT_GATHER_INFO);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2009 Greenbone Networks GmbH");
+ script_dependencies("find_service.nes", "http_version.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+include("http_func.inc");
+include("http_keepalive.inc");
+include("global_settings.inc");
+   
+port = get_http_port(default:80);
+if(!get_port_state(port))exit(0);
+if(!can_host_php(port:port))exit(0);
+
+dirs = make_list("/adaptcms","/cms",cgi_dirs());
+
+foreach dir (dirs) {
+   
+  url = string(dir, "/sitemap.xml"); 
+  req = http_get(item:url, port:port);
+  buf = http_keepalive_send_recv(port:port, data:req, bodyonly:FALSE);  
+  if( buf == NULL )continue;
+
+  if(egrep(pattern: "Generated by AdaptCMS", string: buf, icase: TRUE)) {
+     
+    url = string(dir, "/index.php?view=redirect&url=javascript:alert(%22openvas-xss-test%22)");
+    req = http_get(item:url, port:port);
+    buf = http_keepalive_send_recv(port:port, data:req, bodyonly:TRUE);
+    if( buf == NULL )exit(0);
+
+    if(egrep(pattern: '"openvas-xss-test"', string: buf)) {
+      security_warning(port:port);
+      exit(0);
+    }  
+
+  }
+}
+
+exit(0);
+


Property changes on: trunk/openvas-plugins/scripts/adaptcms_33698.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Added: trunk/openvas-plugins/scripts/phpmyfaq_37180.nasl
===================================================================
--- trunk/openvas-plugins/scripts/phpmyfaq_37180.nasl	2009-12-02 18:07:18 UTC (rev 6040)
+++ trunk/openvas-plugins/scripts/phpmyfaq_37180.nasl	2009-12-02 18:43:26 UTC (rev 6041)
@@ -0,0 +1,91 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# phpMyFAQ 2.5.4 and Prior Multiple Unspecified Cross Site Scripting Vulnerabilities
+#
+# Authors:
+# Michael Meyer
+#
+# Copyright:
+# Copyright (c) 2009 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(100372);
+ script_bugtraq_id(37180);
+ script_version ("1.0-$Revision$");
+
+ script_name("phpMyFAQ 2.5.4 and Prior Multiple Unspecified Cross Site Scripting Vulnerabilities");
+
+desc = "Overview:
+phpMyFAQ is prone to multiple cross-site scripting
+vulnerabilities because the application fails to properly
+sanitize user-supplied input.
+
+An attacker may leverage these issues to execute arbitrary script code
+in the browser of an unsuspecting user in the context of the affected
+site. This may allow the attacker to steal cookie-based authentication
+credentials and to launch other attacks.
+
+Versions prior to phpMyFAQ 2.5.5 are vulnerable.
+
+Solution:
+Updates are available. Please see the references for details.
+
+References:
+http://www.securityfocus.com/bid/37180
+http://www.phpmyfaq.de/
+http://www.phpmyfaq.de/advisory_2009-12-01.php
+
+Risk factor : Medium";
+
+ script_description(desc);
+ script_summary("Determine the phpMyFAQ version");
+ script_category(ACT_GATHER_INFO);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2009 Greenbone Networks GmbH");
+ script_dependencies("phpmyfaq_detect.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+include("http_func.inc");
+include("http_keepalive.inc");
+include("version_func.inc");
+
+port = get_http_port(default:80);
+if(!get_port_state(port))exit(0);
+
+if (!can_host_php(port:port)) exit(0);
+
+if(!version = get_kb_item(string("www/", port, "/phpmyfaq")))exit(0);
+if(!matches = eregmatch(string:version, pattern:"^(.+) under (/.*)$"))exit(0);
+
+vers = matches[1];
+
+if(!isnull(vers) && vers >!< "unknown") {
+
+  if(version_is_less(version: vers, test_version: "2.5.5")) {
+      security_warning(port:port);
+      exit(0);
+  }
+
+}
+
+exit(0);


Property changes on: trunk/openvas-plugins/scripts/phpmyfaq_37180.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Modified: trunk/openvas-plugins/scripts/simple_machines_forum_37182.nasl
===================================================================
--- trunk/openvas-plugins/scripts/simple_machines_forum_37182.nasl	2009-12-02 18:07:18 UTC (rev 6040)
+++ trunk/openvas-plugins/scripts/simple_machines_forum_37182.nasl	2009-12-02 18:43:26 UTC (rev 6041)
@@ -93,7 +93,7 @@
 
  if(version_is_equal(version: vers, test_version: "1.1.10") ||
     version_is_equal(version: vers, test_version: "2.0.RC2")) {
-        security_warning(port:port);
+        security_hole(port:port);
         exit(0);
   }
 }



More information about the Openvas-commits mailing list