[Openvas-commits] r6126 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Fri Dec 11 12:55:09 CET 2009


Author: mime
Date: 2009-12-11 12:55:06 +0100 (Fri, 11 Dec 2009)
New Revision: 6126

Added:
   trunk/openvas-plugins/scripts/barracuda_im_firewall_37248.nasl
   trunk/openvas-plugins/scripts/barracuda_im_firewall_detect.nasl
   trunk/openvas-plugins/scripts/kiwi_syslog_server_37282.nasl
Modified:
   trunk/openvas-plugins/ChangeLog
   trunk/openvas-plugins/cve_current.txt
Log:
Added new plugins

Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2009-12-10 17:09:58 UTC (rev 6125)
+++ trunk/openvas-plugins/ChangeLog	2009-12-11 11:55:06 UTC (rev 6126)
@@ -1,3 +1,10 @@
+2009-12-11 Michael Meyer <michael.meyer at intevation.de>
+
+	* scripts/barracuda_im_firewall_detect.nasl,
+	scripts/barracuda_im_firewall_37248.nasl,
+	scripts/kiwi_syslog_server_37282.nasl:
+	Added new plugins.
+
 2009-12-10 Michael Meyer <michael.meyer at intevation.de>
 
 	* scripts/AnswerBook2_12746.nasl,

Modified: trunk/openvas-plugins/cve_current.txt
===================================================================
--- trunk/openvas-plugins/cve_current.txt	2009-12-10 17:09:58 UTC (rev 6125)
+++ trunk/openvas-plugins/cve_current.txt	2009-12-11 11:55:06 UTC (rev 6126)
@@ -364,4 +364,6 @@
 CVE-2009-3585			Greenbone	svn		R
 CVE-2009-4237			Greenbone	svn		R
 CVE-2009-4238			Greenbone	svn		R
+37248				Greenbone	svn		R
+37282				Greenbone	svn		R
 

Added: trunk/openvas-plugins/scripts/barracuda_im_firewall_37248.nasl
===================================================================
--- trunk/openvas-plugins/scripts/barracuda_im_firewall_37248.nasl	2009-12-10 17:09:58 UTC (rev 6125)
+++ trunk/openvas-plugins/scripts/barracuda_im_firewall_37248.nasl	2009-12-11 11:55:06 UTC (rev 6126)
@@ -0,0 +1,83 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# Barracuda IM Firewall 'smtp_test.cgi' Cross-Site Scripting Vulnerabilities
+#
+# Authors:
+# Michael Meyer
+#
+# Copyright:
+# Copyright (c) 2009 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(100393);
+ script_bugtraq_id(37248);
+ script_version ("1.0-$Revision$");
+
+ script_name("Barracuda IM Firewall 'smtp_test.cgi' Cross-Site Scripting Vulnerabilities");
+
+desc = "Overview:
+Barracuda IM Firewall is prone to multiple cross-site scripting
+vulnerabilities because the application fails to properly sanitize user-
+supplied input.
+
+An attacker may leverage these issues to execute arbitrary script code
+in the browser of an unsuspecting user in the context of the affected
+site. This may help the attacker steal cookie-based authentication
+credentials and launch other attacks.
+
+Barracuda IM Firewall 620 Firmware v4.0.01.003 is vulnerable; other
+versions may also be affected.
+
+References:
+http://www.securityfocus.com/bid/37248
+http://www.barracudanetworks.com/ns/products/im_overview.php
+
+Risk factor : Medium";
+
+ script_description(desc);
+ script_summary("Determine if Barracuda IM Firewall version is 4.0.01.003");
+ script_category(ACT_GATHER_INFO);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2009 Greenbone Networks GmbH");
+ script_dependencies("barracuda_im_firewall_detect.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+include("http_func.inc");
+include("http_keepalive.inc");
+include("version_func.inc");
+
+port = get_http_port(default:80);
+if(!get_port_state(port))exit(0);
+
+if(!version = get_kb_item(string("www/", port, "/barracuda_im_firewall")))exit(0);
+
+if(!isnull(version) && version >!< "unknown") {
+
+  if(version_is_equal(version: version, test_version: "4.0.01.003")) {
+      security_warning(port:port);
+      exit(0);
+  }
+
+}
+
+exit(0);


Property changes on: trunk/openvas-plugins/scripts/barracuda_im_firewall_37248.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Added: trunk/openvas-plugins/scripts/barracuda_im_firewall_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/barracuda_im_firewall_detect.nasl	2009-12-10 17:09:58 UTC (rev 6125)
+++ trunk/openvas-plugins/scripts/barracuda_im_firewall_detect.nasl	2009-12-11 11:55:06 UTC (rev 6126)
@@ -0,0 +1,100 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# Barracuda IM Firewall Detection
+#
+# Authors:
+# Michael Meyer
+#
+# Copyright:
+# Copyright (c) 2009 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+# need desc here to modify it later in script.
+desc = "Overview:
+This host is running Barracuda IM Firewall. Barracuda IM Firewall
+control and manage internal and external instant messaging (IM)
+traffic. 
+
+See also:
+http://www.barracudanetworks.com/
+
+Risk factor : None";
+
+if (description)
+{
+ script_id(100392);
+ script_version ("1.0-$Revision$");
+
+ script_name("Barracuda IM Firewall Detection");
+ script_description(desc);
+ script_summary("Checks for the presence of Barracuda IM Firewall");
+ script_category(ACT_GATHER_INFO);
+ script_family("Service detection");
+ script_copyright("This script is Copyright (C) 2009 Greenbone Networks GmbH");
+ script_dependencies("find_service.nes", "http_version.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+include("http_func.inc");
+include("http_keepalive.inc");
+include("global_settings.inc");
+
+port = get_http_port(default:80);
+if(!get_port_state(port))exit(0);
+
+banner = get_http_banner(port: port);
+if("Server: BarracudaHTTP" >!< banner)exit(0);
+
+ url = string(dir, "/cgi-mod/index.cgi");
+ req = http_get(item:url, port:port);
+ buf = http_keepalive_send_recv(port:port, data:req, bodyonly:FALSE);
+ if( buf == NULL )continue;
+
+ if(egrep(pattern: "<title>Barracuda IM Firewall", string: buf, icase: TRUE)) {
+
+    vers = string("unknown");
+    ### try to get version 
+    version = eregmatch(string: buf, pattern: "barracuda.css\?v=([0-9.]+)",icase:TRUE);
+
+    if ( !isnull(version[1]) ) {
+       vers=chomp(version[1]);
+    }
+
+    set_kb_item(name: string("www/", port, "/barracuda_im_firewall"), value: vers);
+
+    info = string("None\n\nBarracuda IM Firewall Version '");
+    info += string(vers);
+    info += string("' was detected on the remote host.\n");
+
+    desc = ereg_replace(
+        string:desc,
+        pattern:"None$",
+        replace:info
+    );
+
+       if(report_verbosity > 0) {
+         security_note(port:port,data:desc);
+       }
+       exit(0);
+
+ }
+
+exit(0);
+


Property changes on: trunk/openvas-plugins/scripts/barracuda_im_firewall_detect.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Added: trunk/openvas-plugins/scripts/kiwi_syslog_server_37282.nasl
===================================================================
--- trunk/openvas-plugins/scripts/kiwi_syslog_server_37282.nasl	2009-12-10 17:09:58 UTC (rev 6125)
+++ trunk/openvas-plugins/scripts/kiwi_syslog_server_37282.nasl	2009-12-11 11:55:06 UTC (rev 6126)
@@ -0,0 +1,107 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# Kiwi Syslog Server Information Disclosure Weakness and Vulnerability
+#
+# Authors:
+# Michael Meyer
+#
+# Copyright:
+# Copyright (c) 2009 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(100391);
+ script_bugtraq_id(37282);
+ script_version ("1.0-$Revision$");
+
+ script_name("Kiwi Syslog Server Information Disclosure Weakness and Vulnerability");
+
+desc = "Overview:
+Kiwi Syslog Server is prone to an information-disclosure weakness and
+vulnerability.
+
+1) The weakness is caused due to the Web Access login page displaying
+different messages when invalid usernames or passwords are submitted.
+This can be exploited to enumerate user accounts.
+
+2) A security issue is caused due to the Cassini Explorer of the
+embedded UltiDev Cassini Web Server being enabled. This can be
+exploited to access the administrative interface and e.g. disclose the
+content of local files by registering a new application.
+
+An attacker can exploit these vulnerabilities to obtain information
+that may aid in further attacks.
+
+Kiwi Syslog Server 9.0.3 is vulnerable; other versions may also
+be affected.
+
+References:
+http://www.securityfocus.com/bid/37282
+http://www.kiwisyslog.com/kiwi-syslog-server-overview/
+
+Risk factor : Low";
+
+ script_description(desc);
+ script_summary("Determine if Kiwi Syslog Server is prone to an	information-disclosure weakness");
+ script_category(ACT_GATHER_INFO);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2009 Greenbone Networks GmbH");
+ script_dependencies("find_service.nes", "http_version.nasl");
+ script_require_ports("Services/www", 8088);
+ exit(0);
+}
+
+include("http_func.inc");
+include("http_keepalive.inc");
+include("global_settings.inc");
+   
+port = get_http_port(default:8088);
+if(!get_port_state(port))exit(0);
+
+  url = string("/gateway.aspx"); 
+  req = http_get(item:url, port:port);
+  buf = http_keepalive_send_recv(port:port, data:req, bodyonly:FALSE);  
+  if( buf == NULL )continue;
+
+  if(egrep(pattern: "Kiwi Syslog Web Access", string: buf, icase: TRUE)) { 
+
+    url = string("/gateway.aspx?__EVENTTARGET=&__EVENTARGUMENT=&__VIEWSTATE=%2FwEPDwULLTIwNjUwMjM1NjQPZBYCAgMPZBYCAgEPPCsACgEADxYEHgtGYWlsdXJlVGV4dGUeCFVzZXJOYW1lBQ1BZG1pbmlzdHJhdG9yZGQYAQUeX19Db250cm9sc1JlcXVpcmVQb3N0QmFja0tleV9fFgEFGktpd2lMb2dpbiRMb2dpbkltYWdlQnV0dG9uShEYDrwkbsaKaqfUKt%2Bm01b9E0k%3D&KiwiLogin%24UserName=Administrator&KiwiLogin%24Password=BB21158C733229347BD4E681891E213D94C685BE&KiwiLogin%24LoginButton=Log+In&__EVENTVALIDATION=%2FwEWBAL30dbnBgKygMn2DQK9xr32DgK3tbCVAqYdJ5Ze%2Fb7UR1MSh90V%2B%2Fg1SA%2Fb");
+    req = http_get(item:url, port:port);
+    buf = http_keepalive_send_recv(port:port, data:req, bodyonly:FALSE);
+
+    message = eregmatch(pattern: "showBalloonHelp.*Authentication Failed.  ([^.]+)", string: buf);
+    if(isnull(message[1]))exit(0);
+    p = message[1];
+    
+    url = string("/gateway.aspx?__EVENTTARGET=&__EVENTARGUMENT=&__VIEWSTATE=%2FwEPDwULLTIwNjUwMjM1NjQPZBYCAgMPZBYCAgEPPCsACgEADxYEHgtGYWlsdXJlVGV4dGUeCFVzZXJOYW1lBQ1BZG1pbmlzdHJhdG9yZGQYAQUeX19Db250cm9sc1JlcXVpcmVQb3N0QmFja0tleV9fFgEFGktpd2lMb2dpbiRMb2dpbkltYWdlQnV0dG9uShEYDrwkbsaKaqfUKt%2Bm01b9E0k%3D&KiwiLogin%24UserName=Administrato&KiwiLogin%24Password=BB21158C733229347BD4E681891E213D94C685BE&KiwiLogin%24LoginButton=Log+In&__EVENTVALIDATION=%2FwEWBAL30dbnBgKygMn2DQK9xr32DgK3tbCVAqYdJ5Ze%2Fb7UR1MSh90V%2B%2Fg1SA%2Fb");
+    req = http_get(item:url, port:port);
+    buf = http_keepalive_send_recv(port:port, data:req, bodyonly:FALSE);
+    message = eregmatch(pattern: "showBalloonHelp.*Authentication Failed.  ([^.]+)", string: buf);
+    if(isnull(message[1]))exit(0);
+    u = message[1];
+
+    if(p != u) {
+      security_warning(port: port);
+      exit(0);
+    }  
+
+  }
+
+exit(0);
+


Property changes on: trunk/openvas-plugins/scripts/kiwi_syslog_server_37282.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision



More information about the Openvas-commits mailing list