[Openvas-commits] r6114 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Wed Dec 9 12:14:55 CET 2009


Author: mime
Date: 2009-12-09 12:14:51 +0100 (Wed, 09 Dec 2009)
New Revision: 6114

Added:
   trunk/openvas-plugins/scripts/moodle_37244.nasl
Modified:
   trunk/openvas-plugins/ChangeLog
   trunk/openvas-plugins/cve_current.txt
   trunk/openvas-plugins/scripts/phpshop_37227.nasl
Log:
Added new plugin

Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2009-12-09 10:03:57 UTC (rev 6113)
+++ trunk/openvas-plugins/ChangeLog	2009-12-09 11:14:51 UTC (rev 6114)
@@ -1,3 +1,11 @@
+2009-12-09 Michael Meyer <michael.meyer at intevation.de>
+
+	* scripts/moodle_37244.nasl:
+	Added new plugin.
+
+	* scripts/phpshop_37227.nasl:
+	Bugfix.
+
 2009-12-09  Chandrashekhar B <bchandra at secpod.com>
 
 	* scripts/cpe.inc: removed double slash in an entry.

Modified: trunk/openvas-plugins/cve_current.txt
===================================================================
--- trunk/openvas-plugins/cve_current.txt	2009-12-09 10:03:57 UTC (rev 6113)
+++ trunk/openvas-plugins/cve_current.txt	2009-12-09 11:14:51 UTC (rev 6114)
@@ -360,4 +360,5 @@
 CVE-2009-4209			SecPod		svn		R
 CVE-2009-4204			SecPod		svn		R
 CVE-2009-4205			SecPod		svn		R
+37244				Greenbone	svn		R
 

Added: trunk/openvas-plugins/scripts/moodle_37244.nasl
===================================================================
--- trunk/openvas-plugins/scripts/moodle_37244.nasl	2009-12-09 10:03:57 UTC (rev 6113)
+++ trunk/openvas-plugins/scripts/moodle_37244.nasl	2009-12-09 11:14:51 UTC (rev 6114)
@@ -0,0 +1,96 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# Moodle Multiple Vulnerabilities
+#
+# Authors:
+# Michael Meyer
+#
+# Copyright:
+# Copyright (c) 2009 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(100384);
+ script_bugtraq_id(37244);
+ script_version ("1.0-$Revision$");
+
+ script_name("Moodle Multiple Vulnerabilities");
+
+desc = "Overview:
+Moodle is prone to multiple vulnerabilities including cross-site
+request-forgery, security bypass, information-disclosure and SQL-
+injection issues.
+
+Attackers can exploit these issues to bypass certain security
+restrictions, gain access to sensitive information, perform
+unauthorized actions, compromise the application, access or modify
+data, or exploit latent vulnerabilities in the underlying database.
+
+These issues affect Moodle versions prior to 1.8.11 and 1.9.7.
+
+Solution:
+Updates are available. Please see the references for more information.
+
+References:
+http://www.securityfocus.com/bid/37244
+http://www.moodle.org
+http://moodle.org/security/
+
+Risk factor : Medium";
+
+ script_description(desc);
+ script_summary("Determine if the Moodle version is < 1.8.11 or < 1.9.7");
+ script_category(ACT_GATHER_INFO);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2009 Greenbone Networks GmbH");
+ script_dependencies("gb_moodle_cms_detect.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+include("http_func.inc");
+include("http_keepalive.inc");
+include("version_func.inc");
+
+port = get_http_port(default:80);
+if(!get_port_state(port))exit(0);
+
+if (!can_host_php(port:port)) exit(0);
+
+if(!version = get_kb_item(string("www/", port, "/moodle")))exit(0);
+if(!matches = eregmatch(string:version, pattern:"^(.+) under (/.*)$"))exit(0);
+
+vers = matches[1];
+
+if(!isnull(vers) && vers >!< "unknown") {
+ if(vers =~ "1\.8") {
+   if(version_is_less(version: vers, test_version: "1.8.11")) {
+       security_warning(port:port);
+       exit(0);
+   }
+ } else if(vers =~ "1\.9") {
+    if(version_is_less(version: vers, test_version: "1.9.7")) {
+      security_warning(port:port);
+      exit(0);
+    }  
+ }  
+}
+
+exit(0);


Property changes on: trunk/openvas-plugins/scripts/moodle_37244.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Modified: trunk/openvas-plugins/scripts/phpshop_37227.nasl
===================================================================
--- trunk/openvas-plugins/scripts/phpshop_37227.nasl	2009-12-09 10:03:57 UTC (rev 6113)
+++ trunk/openvas-plugins/scripts/phpshop_37227.nasl	2009-12-09 11:14:51 UTC (rev 6114)
@@ -70,7 +70,7 @@
 if(!get_port_state(port))exit(0);
 if (!can_host_php(port:port)) exit(0);
 
-if(!version = get_kb_item(string("www/", port, "/SET_ME")))exit(0);
+if(!version = get_kb_item(string("www/", port, "/phpshop")))exit(0);
 if(!matches = eregmatch(string:version, pattern:"^(.+) under (/.*)$"))exit(0);
 
 dir = matches[2];



More information about the Openvas-commits mailing list