[Openvas-commits] r5754 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Thu Oct 29 12:31:58 CET 2009


Author: mime
Date: 2009-10-29 12:31:54 +0100 (Thu, 29 Oct 2009)
New Revision: 5754

Added:
   trunk/openvas-plugins/scripts/base_36830.nasl
   trunk/openvas-plugins/scripts/base_detect.nasl
   trunk/openvas-plugins/scripts/tftgallery_36833.nasl
   trunk/openvas-plugins/scripts/tftgallery_detect.nasl
Modified:
   trunk/openvas-plugins/ChangeLog
   trunk/openvas-plugins/cve_current.txt
   trunk/openvas-plugins/scripts/secpod_prochatrooms_dir_trav_n_xss_vuln.nasl
   trunk/openvas-plugins/scripts/secpod_projectbutler_file_inc_vuln.nasl
Log:
Added new?\194?\160plugins

Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2009-10-29 10:40:52 UTC (rev 5753)
+++ trunk/openvas-plugins/ChangeLog	2009-10-29 11:31:54 UTC (rev 5754)
@@ -1,3 +1,15 @@
+2009-10-29 Michael Meyer <michael.meyer at intevation.de>
+
+	* scripts/base_detect.nasl,
+	scripts/base_36830.nasl,
+	scripts/tftgallery_detect.nasl,
+	scripts/tftgallery_36833.nasl:
+	Added new plugins.
+
+	* scripts/secpod_prochatrooms_dir_trav_n_xss_vuln.nasl,
+	scripts/secpod_projectbutler_file_inc_vuln.nasl:
+	Fixed FP when running against Squid-Port.
+
 2009-10-29  Chandrashekhar B <bchandra at secpod.com>
 
 	* scripts/secpod_ca_mult_prdts_detect_win.nasl,

Modified: trunk/openvas-plugins/cve_current.txt
===================================================================
--- trunk/openvas-plugins/cve_current.txt	2009-10-29 10:40:52 UTC (rev 5753)
+++ trunk/openvas-plugins/cve_current.txt	2009-10-29 11:31:54 UTC (rev 5754)
@@ -200,9 +200,11 @@
 36814				Greenbone	svn		R
 36821				Greenbone	svn		R
 36820				Greenbone	svn		R
-CVE-2009-3660 
+CVE-2009-3660 			SecPod
 CVE-2009-3714			SecPod		svn		R
 CVE-2009-3715			SecPod		svn		R
 CVE-2009-2911			SecPod		svn		L
 CVE-2009-3587			SecPod		svn		L
 CVE-2009-3588			SecPod		svn		L
+36830				Greenbone	svn		R
+36833				Greenbone	svn		R

Added: trunk/openvas-plugins/scripts/base_36830.nasl
===================================================================
--- trunk/openvas-plugins/scripts/base_36830.nasl	2009-10-29 10:40:52 UTC (rev 5753)
+++ trunk/openvas-plugins/scripts/base_36830.nasl	2009-10-29 11:31:54 UTC (rev 5754)
@@ -0,0 +1,91 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# Basic Analysis and Security Engine Multiple Input Validation Vulnerabilities
+#
+# Authors:
+# Michael Meyer
+#
+# Copyright:
+# Copyright (c) 2009 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(100323);
+ script_bugtraq_id(36830);
+ script_version ("1.0-$Revision$");
+
+ script_name("Basic Analysis and Security Engine Multiple Input Validation Vulnerabilities");
+
+desc = "Overview:
+Basic Analysis and Security Engine (BASE) is prone to multiple input-
+validation vulnerabilities because it fails to adequately sanitize user-
+supplied input. These vulnerabilities include an SQL-injection issue,
+a cross-site scripting issue, and a local file-include issue.
+
+Exploiting these issues can allow an attacker to steal cookie-based
+authentication credentials, view and execute local files within the
+context of the webserver, compromise the application, access or modify
+data, or exploit latent vulnerabilities in the underlying database.
+Other attacks may also be possible.
+
+These issues affect versions prior to BASE 1.4.4.
+
+Solution:
+Updates are available. Please see the references for details.
+
+References:
+http://www.securityfocus.com/bid/36830
+http://secureideas.sourceforge.net/
+
+Risk factor : Medium";
+
+ script_description(desc);
+ script_summary("Determine if BASE version is < 1.4.4");
+ script_category(ACT_GATHER_INFO);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2009 Greenbone Networks GmbH");
+ script_dependencies("base_detect.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+include("http_func.inc");
+include("version_func.inc");
+
+port = get_http_port(default:80);
+if(!get_port_state(port))exit(0);
+
+if (!can_host_php(port:port)) exit(0);
+
+if(!version = get_kb_item(string("www/", port, "/base")))exit(0);
+if(!matches = eregmatch(string:version, pattern:"^(.+) under (/.*)$"))exit(0);
+
+vers = matches[1];
+
+if(!isnull(vers) && vers >!< "unknown") {
+
+  if(version_is_less(version: vers, test_version: "1.4.4")) {
+      security_warning(port:port);
+      exit(0);
+  }
+
+}
+
+exit(0);


Property changes on: trunk/openvas-plugins/scripts/base_36830.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Added: trunk/openvas-plugins/scripts/base_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/base_detect.nasl	2009-10-29 10:40:52 UTC (rev 5753)
+++ trunk/openvas-plugins/scripts/base_detect.nasl	2009-10-29 11:31:54 UTC (rev 5754)
@@ -0,0 +1,111 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# Basic Analysis and Security Engine Detection
+#
+# Authors:
+# Michael Meyer
+#
+# Copyright:
+# Copyright (c) 2009 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+# need desc here to modify it later in script.
+desc = "Overview:
+This host is running Basic Analysis and Security Engine (BASE). BASE
+provides a web front-end to query and analyze the alerts coming from a
+SNORT IDS system.
+
+See also:
+http://base.secureideas.net
+
+Risk factor : None";
+
+if (description)
+{
+ script_id(100322);
+ script_version ("1.0-$Revision$");
+
+ script_name("Basic Analysis and Security Engine Detection");
+ script_description(desc);
+ script_summary("Checks for the presence of Basic Analysis and Security Engine");
+ script_category(ACT_GATHER_INFO);
+ script_family("Service detection");
+ script_copyright("This script is Copyright (C) 2009 Greenbone Networks GmbH");
+ script_dependencies("find_service.nes", "http_version.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+
+include("http_func.inc");
+include("http_keepalive.inc");
+include("global_settings.inc");
+
+port = get_http_port(default:80);
+
+if(!get_port_state(port))exit(0);
+if(!can_host_php(port:port))exit(0);
+
+dirs = make_list("/base","/snort/base",cgi_dirs());
+
+foreach dir (dirs) {
+
+ url = string(dir, "/index.php");
+ req = http_get(item:url, port:port);
+ buf = http_keepalive_send_recv(port:port, data:req, bodyonly:FALSE);
+ if( buf == NULL )continue;
+
+ if(egrep(pattern: "<title>Basic Analysis and Security Engine \(BASE\)", string: buf, icase: TRUE) )
+ {
+     if(strlen(dir)>0) {
+        install=dir;
+     } else {
+        install=string("/");
+     }
+
+    vers = string("unknown");
+    ### try to get version 
+    version = eregmatch(string: buf, pattern: "BASE[)</a>]* ([0-9.]+)",icase:TRUE);
+
+    if ( !isnull(version[1]) ) {
+       vers=chomp(version[1]);
+    }
+
+    set_kb_item(name: string("www/", port, "/base"), value: string(vers," under ",install));
+
+    info = string("None\n\nBasic Analysis and Security Engine (BASE) Version '");
+    info += string(vers);
+    info += string("' was detected on the remote host in the following directory(s):\n\n");
+    info += string(install, "\n");
+
+    desc = ereg_replace(
+        string:desc,
+        pattern:"None$",
+        replace:info
+    );
+
+       if(report_verbosity > 0) {
+         security_note(port:port,data:desc);
+       }
+       exit(0);
+
+ }
+}
+exit(0);
+


Property changes on: trunk/openvas-plugins/scripts/base_detect.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_prochatrooms_dir_trav_n_xss_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_prochatrooms_dir_trav_n_xss_vuln.nasl	2009-10-29 10:40:52 UTC (rev 5753)
+++ trunk/openvas-plugins/scripts/secpod_prochatrooms_dir_trav_n_xss_vuln.nasl	2009-10-29 11:31:54 UTC (rev 5754)
@@ -105,7 +105,7 @@
     }
   }
 
-  if("XSSED" >< rcvRes)
+  if("XSSED" >< rcvRes && rcvRes =~ "HTTP/1\.[0-9]+ 200")
   {
     security_warning(pcrPort);
     exit(0);

Modified: trunk/openvas-plugins/scripts/secpod_projectbutler_file_inc_vuln.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_projectbutler_file_inc_vuln.nasl	2009-10-29 10:40:52 UTC (rev 5753)
+++ trunk/openvas-plugins/scripts/secpod_projectbutler_file_inc_vuln.nasl	2009-10-29 11:31:54 UTC (rev 5754)
@@ -98,7 +98,7 @@
   sndReq = http_get(item:string(dir, "/pda/pda_projects.php?offset=ATTACK-STRING"),
                                 port:pbPort);
   rcvRes = http_send_recv(port:pbPort, data:sndReq);
-  if("ATTACK-STRING" >< rcvRes)
+  if("ATTACK-STRING" >< rcvRes && rcvRes =~ "HTTP/1\.[0-9]+ 200")
   {
       security_hole(pbPort);
       exit(0);

Added: trunk/openvas-plugins/scripts/tftgallery_36833.nasl
===================================================================
--- trunk/openvas-plugins/scripts/tftgallery_36833.nasl	2009-10-29 10:40:52 UTC (rev 5753)
+++ trunk/openvas-plugins/scripts/tftgallery_36833.nasl	2009-10-29 11:31:54 UTC (rev 5754)
@@ -0,0 +1,86 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# TFTgallery 'album' Parameter Cross Site Scripting Vulnerability
+#
+# Authors:
+# Michael Meyer
+#
+# Copyright:
+# Copyright (c) 2009 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(100325);
+ script_bugtraq_id(36833);
+ script_version ("1.0-$Revision$");
+
+ script_name("TFTgallery 'album' Parameter Cross Site Scripting Vulnerability");
+
+desc = "Overview:
+TFTgallery is prone to a cross-site scripting vulnerability because
+the application fails to sufficiently sanitize user-supplied input.
+
+An attacker may leverage this issue to execute arbitrary script code
+in the browser of an unsuspecting user in the context of the affected
+site. This may let the attacker steal cookie-based authentication
+credentials and launch other attacks.
+
+This issue affects TFTgallery 0.13; other versions may be
+vulnerable as well.
+
+References:
+http://www.securityfocus.com/bid/36833
+http://www.tftgallery.org/
+
+Risk factor : Low";
+
+ script_description(desc);
+ script_summary("Determine if TFTgallery version is 0.13");
+ script_category(ACT_GATHER_INFO);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2009 Greenbone Networks GmbH");
+ script_dependencies("tftgallery_detect.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+include("http_func.inc");
+include("version_func.inc");
+
+port = get_http_port(default:80);
+if(!get_port_state(port))exit(0);
+
+if (!can_host_php(port:port)) exit(0);
+
+if(!version = get_kb_item(string("www/", port, "/tftgallery")))exit(0);
+if(!matches = eregmatch(string:version, pattern:"^(.+) under (/.*)$"))exit(0);
+
+vers = matches[1];
+
+if(!isnull(vers) && vers >!< "unknown") {
+
+  if(version_is_equal(version: vers, test_version: "0.13")) {
+      security_warning(port:port);
+      exit(0);
+  }
+
+}
+
+exit(0);


Property changes on: trunk/openvas-plugins/scripts/tftgallery_36833.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Added: trunk/openvas-plugins/scripts/tftgallery_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/tftgallery_detect.nasl	2009-10-29 10:40:52 UTC (rev 5753)
+++ trunk/openvas-plugins/scripts/tftgallery_detect.nasl	2009-10-29 11:31:54 UTC (rev 5754)
@@ -0,0 +1,110 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# TFT Gallery Detection
+#
+# Authors:
+# Michael Meyer
+#
+# Copyright:
+# Copyright (c) 2009 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+# need desc here to modify it later in script.
+desc = "Overview:
+This host is running TFT Gallery, an easy-to-use image gallery
+using PHP.
+
+See also:
+http://www.tftgallery.org
+
+Risk factor : None";
+
+if (description)
+{
+ script_id(100324);
+ script_version ("1.0-$Revision$");
+
+ script_name("TFT Gallery Detection");
+ script_description(desc);
+ script_summary("Checks for the presence of TFT Gallery");
+ script_category(ACT_GATHER_INFO);
+ script_family("Service detection");
+ script_copyright("This script is Copyright (C) 2009 Greenbone Networks GmbH");
+ script_dependencies("find_service.nes", "http_version.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+
+include("http_func.inc");
+include("http_keepalive.inc");
+include("global_settings.inc");
+
+port = get_http_port(default:80);
+
+if(!get_port_state(port))exit(0);
+if(!can_host_php(port:port))exit(0);
+
+dirs = make_list("/gallery","/photos",cgi_dirs());
+
+foreach dir (dirs) {
+
+ url = string(dir, "/index.php");
+ req = http_get(item:url, port:port);
+ buf = http_keepalive_send_recv(port:port, data:req, bodyonly:FALSE);
+ if( buf == NULL )continue;
+
+ if(egrep(pattern: '<meta name="generator" content="(TFT Gallery|TFTgallery)', string: buf, icase: TRUE))
+ {
+     if(strlen(dir)>0) {
+        install=dir;
+     } else {
+        install=string("/");
+     }
+
+    vers = string("unknown");
+    ### try to get version 
+    version = eregmatch(string: buf, pattern: "(TFT Gallery|TFTgallery) ([0-9.]+)",icase:TRUE);
+
+    if ( !isnull(version[2]) ) {
+       vers=chomp(version[2]);
+    }
+
+    set_kb_item(name: string("www/", port, "/tftgallery"), value: string(vers," under ",install));
+
+    info = string("None\n\nTFT Gallery Version '");
+    info += string(vers);
+    info += string("' was detected on the remote host in the following directory(s):\n\n");
+    info += string(install, "\n");
+
+    desc = ereg_replace(
+        string:desc,
+        pattern:"None$",
+        replace:info
+    );
+
+       if(report_verbosity > 0) {
+         security_note(port:port,data:desc);
+       }
+       exit(0);
+
+ }
+}
+exit(0);
+


Property changes on: trunk/openvas-plugins/scripts/tftgallery_detect.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision



More information about the Openvas-commits mailing list