[Openvas-commits] r3525 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Thu May 28 16:49:19 CEST 2009


Author: mime
Date: 2009-05-28 16:49:18 +0200 (Thu, 28 May 2009)
New Revision: 3525

Added:
   trunk/openvas-plugins/scripts/apache_CVE_2009_1195.nasl
   trunk/openvas-plugins/scripts/cacti_27749.nasl
   trunk/openvas-plugins/scripts/lighttpd_35097.nasl
Modified:
   trunk/openvas-plugins/ChangeLog
   trunk/openvas-plugins/cve_current.txt
Log:
Added new plugins

Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2009-05-28 14:21:01 UTC (rev 3524)
+++ trunk/openvas-plugins/ChangeLog	2009-05-28 14:49:18 UTC (rev 3525)
@@ -1,3 +1,9 @@
+2009-05-28 Michael Meyer <mime at gmx.de>
+	* scripts/cacti_27749.nasl,
+	scripts/lighttpd_35097.nasl,
+	scripts/apache_CVE_2009_1195.nasl:
+	Added new plugins
+
 2009-05-28  Jan-Oliver Wagner <jan-oliver.wagner at greenbone.net>
 
 	* scripts/silverstream_dirlisting.nasl: Removed inactive,

Modified: trunk/openvas-plugins/cve_current.txt
===================================================================
--- trunk/openvas-plugins/cve_current.txt	2009-05-28 14:21:01 UTC (rev 3524)
+++ trunk/openvas-plugins/cve_current.txt	2009-05-28 14:49:18 UTC (rev 3525)
@@ -52,12 +52,12 @@
 CVE-2009-1769 			SecPod
 CVE-2009-1758 			SecPod
 CVE-2009-1759 			SecPod
-CVE-2008-0786                   mime
-CVE-2008-0785                   mime
-CVE-2008-0784                   mime
-CVE-2008-0783                   mime
-35097                           mime
-CVE-2009-1195			mime
+CVE-2008-0786                   mime		svn
+CVE-2008-0785                   mime		svn
+CVE-2008-0784                   mime		svn
+CVE-2008-0783                   mime		svn
+35097                           mime		svn
+CVE-2009-1195			mime		svn
 CVE-2009-1757                   SecPod
 CVE-2009-0688                   SecPod
 CVE-2009-1791			SecPod

Added: trunk/openvas-plugins/scripts/apache_CVE_2009_1195.nasl
===================================================================
--- trunk/openvas-plugins/scripts/apache_CVE_2009_1195.nasl	2009-05-28 14:21:01 UTC (rev 3524)
+++ trunk/openvas-plugins/scripts/apache_CVE_2009_1195.nasl	2009-05-28 14:49:18 UTC (rev 3525)
@@ -0,0 +1,79 @@
+##############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# Apache 'Options' and 'AllowOverride' Directives Security Bypass
+# Vulnerability
+#
+# Authors:
+# Michael Meyer
+#
+# Copyright:
+# Copyright (c) 2009 Michael Meyer
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if(description)
+{
+  script_id(100211);
+  script_version("$Revision: 1.0 $");
+  script_cve_id("CVE-2009-1195");
+  script_bugtraq_id(35115);
+  script_name(english:"Apache 'Options' and 'AllowOverride' Directives Security Bypass Vulnerability");
+  desc["english"] = "
+  Overview:
+   Apache HTTP server is prone to a security-bypass vulnerability
+   related to the handling of specific configuration directives.
+
+   A local attacker may exploit this issue to execute arbitrary code
+   within the context of the webserver process. This may result in
+   elevated privileges or aid in further attacks.
+
+   Versions prior to Apache 2.2.9 are vulnerable. 
+
+  Solution:
+   Updates are available. Please see http://httpd.apache.org/
+   for more Information.
+
+  See also:
+   http://www.securityfocus.com/bid/35115
+
+  Risk factor: Medium";
+
+  script_description(english:desc["english"]);
+  script_summary(english:"Check for Apache Web Server version");
+  script_category(ACT_GATHER_INFO);
+  script_copyright(english:"Copyright (C) 2009 Michael Meyer");
+  script_family(english:"Web Servers");
+  script_dependencies("http_version.nasl", "secpod_apache_detect.nasl");
+  script_require_ports("Services/www", 80);
+  exit(0);
+}
+
+
+include("http_func.inc");
+include("version_func.inc");
+
+httpdPort = get_http_port(default:80);
+if(!httpdPort){
+  exit(0);
+}
+
+version = get_kb_item("www/" + httpdPort + "/Apache");
+if(version != NULL){
+  if(version_is_less(version:version, test_version:"2.2.9")){
+    security_warning(httpdPort);
+  }
+}


Property changes on: trunk/openvas-plugins/scripts/apache_CVE_2009_1195.nasl
___________________________________________________________________
Name: svn:executable
   + *
Name: svn:keywords
   + ID

Added: trunk/openvas-plugins/scripts/cacti_27749.nasl
===================================================================
--- trunk/openvas-plugins/scripts/cacti_27749.nasl	2009-05-28 14:21:01 UTC (rev 3524)
+++ trunk/openvas-plugins/scripts/cacti_27749.nasl	2009-05-28 14:49:18 UTC (rev 3525)
@@ -0,0 +1,95 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# Cacti Multiple Input Validation Vulnerabilities
+#
+# Authors
+# Michael Meyer
+#
+# Copyright:
+# Copyright (c) 2009 Michael Meyer
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(100213);
+ script_cve_id("CVE-2008-0786","CVE-2008-0785","CVE-2008-0784","CVE-2008-0783");
+ script_bugtraq_id(27749);
+ script_version ("1.0");
+
+ script_name(english:"Cacti Multiple Input Validation Vulnerabilities");
+ desc["english"] = "
+
+ Overview:
+  Cacti is prone to multiple unspecified input-validation
+  vulnerabilities, including:
+
+  - Multiple cross-site scripting vulnerabilities
+  - Multiple SQL-injection vulnerabilities
+  - An HTTP response-splitting vulnerability.
+
+  Attackers may exploit these vulnerabilities to influence or
+  misrepresent how web content is served, cached, or interpreted, to
+  compromise the application, to access or modify data, to exploit
+  vulnerabilities in the underlying database, or to execute arbitrary
+  script code in the browser of an unsuspecting user.
+
+  These issues affect Cacti 0.8.7a and prior versions. 
+
+ See also:
+  http://www.securityfocus.com/bid/27749
+
+ Solution:
+  Updates are available. Please see http://cacti.net/ for more
+  information.  
+
+ Risk factor : Medium";
+
+ script_description(english:desc["english"]);
+ script_summary(english:"Determine if Cacti Version < 0.8.7b");
+ script_category(ACT_GATHER_INFO);
+ script_family(english:"Web application abuses");
+ script_copyright(english:"This script is Copyright (C) 2009 Michael Meyer");
+ script_dependencie("cacti_detect.nasl");
+ script_require_ports("Services/www", 80);
+ exit(0);
+}
+
+include("http_func.inc");
+include("http_keepalive.inc");
+include("version_func.inc");
+
+port = get_http_port(default:80);
+if(!get_port_state(port))exit(0);
+
+if(!can_host_php(port:port)) exit(0);
+
+if(!version = get_kb_item(string("www/", port, "/cacti")))exit(0);
+if(!matches = eregmatch(string:version, pattern:"^(.+) under (/.*)$"))exit(0);
+
+vers = matches[1];
+
+if(!isnull(vers) && vers >!< "unknown") {
+
+  if(version_is_less(version: vers, test_version: "0.8.7b")) {
+      security_warning(port:port);
+      exit(0);
+  }  
+
+} 
+
+exit(0);


Property changes on: trunk/openvas-plugins/scripts/cacti_27749.nasl
___________________________________________________________________
Name: svn:keywords
   + ID

Added: trunk/openvas-plugins/scripts/lighttpd_35097.nasl
===================================================================
--- trunk/openvas-plugins/scripts/lighttpd_35097.nasl	2009-05-28 14:21:01 UTC (rev 3524)
+++ trunk/openvas-plugins/scripts/lighttpd_35097.nasl	2009-05-28 14:49:18 UTC (rev 3525)
@@ -0,0 +1,86 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# Lighttpd Trailing Slash Information Disclosure Vulnerability
+#
+# Authors
+# Michael Meyer
+#
+# Copyright:
+# Copyright (c) 2009 Michael Meyer
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(100212);
+ script_bugtraq_id(35097);
+ script_version ("1.0");
+
+ script_name(english:"Lighttpd Trailing Slash Information Disclosure Vulnerability");
+ desc["english"] = "
+
+ Overview:
+  According to its version number, the remote version of Lighttpd is
+  prone to an information-disclosure vulnerability.
+
+  Attackers can exploit this issue to obtain sensitive information
+  that may lead to further attacks.
+
+  Lighttpd 1.4.23 is vulnerable; other versions may also be affected. 
+
+ Solution:
+  An update is available. Please see http://www.lighttpd.net
+  for more information.
+
+ See also:
+  http://www.securityfocus.com/bid/35097
+
+ Risk factor : Medium";
+
+ script_description(english:desc["english"]);
+ script_summary(english:"Determine ithe version of Lighttpd");
+ script_category(ACT_GATHER_INFO);
+ script_family(english:"Web Servers");
+ script_copyright(english:"This script is Copyright (C) 2009 Michael Meyer");
+ script_dependencie("find_service.nes", "http_version.nasl");
+ script_require_ports("Services/www", 80);
+ exit(0);
+}
+
+include("misc_func.inc");
+include("http_func.inc");
+include("version_func.inc");
+
+port = get_http_port(default:80);
+if(!get_port_state(port)) exit(0);
+if(get_kb_item("Services/www/" + port + "/embedded" ))exit(0);
+
+banner = get_http_banner(port:port);
+if (!banner)exit(0);
+if(!egrep(pattern:"Server: lighttpd/[0-9.]+", string:banner) ) exit(0);
+
+version = eregmatch(pattern: "Server: lighttpd/([0-9.]+)", string: banner);
+if(!isnull(version[1])) {
+  if( version_is_less_equal(version:version[1], test_version:"1.4.23") ) {
+
+   security_warning(port:port);
+   exit(0);
+
+  }  
+}
+
+exit(0);


Property changes on: trunk/openvas-plugins/scripts/lighttpd_35097.nasl
___________________________________________________________________
Name: svn:keywords
   + ID



More information about the Openvas-commits mailing list