[Openvas-commits] r8924 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Tue Aug 31 14:30:55 CEST 2010


Author: mime
Date: 2010-08-31 14:30:50 +0200 (Tue, 31 Aug 2010)
New Revision: 8924

Added:
   trunk/openvas-plugins/scripts/gb_123_flash_chat_42478.nasl
   trunk/openvas-plugins/scripts/gb_mybackup_08_10.nasl
   trunk/openvas-plugins/scripts/gb_servu_42523.nasl
Modified:
   trunk/openvas-plugins/ChangeLog
Log:
Added new plugins

Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2010-08-30 14:59:25 UTC (rev 8923)
+++ trunk/openvas-plugins/ChangeLog	2010-08-31 12:30:50 UTC (rev 8924)
@@ -1,3 +1,10 @@
+2010-08-31  Michael Meyer <michael.meyer at greenbone.net>
+
+	* scripts/gb_123_flash_chat_42478.nasl,
+	scripts/gb_mybackup_08_10.nasl,
+	scripts/gb_servu_42523.nasl:
+	Added new plugins.
+
 2010-08-30  Veerendra G.G <veerendragg at secpod.com>
 
 	* scripts/gb_CESA-2010_0474_kernel_centos4_i386.nasl,

Added: trunk/openvas-plugins/scripts/gb_123_flash_chat_42478.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_123_flash_chat_42478.nasl	2010-08-30 14:59:25 UTC (rev 8923)
+++ trunk/openvas-plugins/scripts/gb_123_flash_chat_42478.nasl	2010-08-31 12:30:50 UTC (rev 8924)
@@ -0,0 +1,84 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# 123 Flash Chat Multiple Security Vulnerabilities
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2010 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(100766);
+ script_bugtraq_id(42478);
+ script_version ("1.0-$Revision$");
+
+ script_name("123 Flash Chat Multiple Security Vulnerabilities");
+
+desc = "Overview:
+123 Flash Chat is prone to multiple security vulnerabilities. These
+vulnerabilities include a cross-site scripting vulnerability, multiple
+information-disclosure vulnerabilities, and a directory-traversal
+vulnerability.
+
+An attacker can exploit these vulnerabilities to execute arbitrary
+script code in the browser of an unsuspecting user in the context of
+the affected site, steal cookie-based authentication credentials,
+obtain sensitive information, or perform unauthorized actions. Other
+attacks are also possible.
+
+123 Flash Chat 7.8 is vulnerable; other versions may also be affected.
+
+References:
+https://www.securityfocus.com/bid/42478
+http://123flashchat.com/";
+
+ script_tag(name:"risk_factor", value:"Medium");
+ script_description(desc);
+ script_summary("Determine if 23 Flash Chat is prone to multiple security vulnerabilities.");
+ script_category(ACT_ATTACK);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2010 Greenbone Networks GmbH");
+ script_dependencies("find_service.nes", "http_version.nasl");
+ script_require_ports("Services/www", 35555);
+ exit(0);
+}
+
+include("http_func.inc");
+include("http_keepalive.inc");
+include("global_settings.inc");
+   
+port = get_http_port(default:35555);
+if(!get_port_state(port))exit(0);
+
+banner = get_http_banner(port:port);
+if(!banner || "Server: TopCMM Server" >!< banner)exit(0);
+
+url = string("/index.html%27%22--%3E%3Cscript%3Ealert%28%27openvas-xss-test%27%29%3C/script%3E"); 
+
+if(http_vuln_check(port:port, url:url,pattern:"<script>alert\('openvas-xss-test'\)</script>",extra_check:"Error Information")) {
+     
+  security_warning(port:port);
+  exit(0);
+
+}
+
+exit(0);
+


Property changes on: trunk/openvas-plugins/scripts/gb_123_flash_chat_42478.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Added: trunk/openvas-plugins/scripts/gb_mybackup_08_10.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_mybackup_08_10.nasl	2010-08-30 14:59:25 UTC (rev 8923)
+++ trunk/openvas-plugins/scripts/gb_mybackup_08_10.nasl	2010-08-31 12:30:50 UTC (rev 8924)
@@ -0,0 +1,86 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# MyBackup 1.4.0 Multiple Security Vulnerabilities
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2010 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(100768);
+ script_cve_id("CVE-2009-4977","CVE-2009-4978");
+ script_version ("1.0-$Revision$");
+
+ script_name("MyBackup 1.4.0 Multiple Security Vulnerabilities");
+
+desc = "Overview:
+MyBackup is prone to multiple security vulnerabilities. These
+vulnerabilities include a directory-traversal vulnerability and a
+arbitrary PHP code execution vulnerability.
+
+An attacker can exploit these vulnerabilities to execute arbitrary
+php code in the context of the affected site or obtain sensitive 
+information. Other attacks are also possible.
+
+MyBackup 1.4.0 is vulnerable; other versions may also be affected.
+
+References:
+http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-4978
+http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-4977";
+
+ script_tag(name:"cvss_base", value:"6.5");
+ script_tag(name:"risk_factor", value:"High");
+ script_description(desc);
+ script_summary("Determine if installed MyBackup is vulnerable");
+ script_category(ACT_ATTACK);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2010 Greenbone Networks GmbH");
+ script_dependencies("find_service.nes", "http_version.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+include("http_func.inc");
+include("http_keepalive.inc");
+include("global_settings.inc");
+   
+port = get_http_port(default:80);
+if(!get_port_state(port))exit(0);
+if(!can_host_php(port:port))exit(0);
+
+dirs = make_list("/backup","/mybackup",cgi_dirs());
+
+foreach dir (dirs) {
+   
+  url = string(dir, "/down.php?filename=../../../../../../../../../../../../etc/passwd%00"); 
+
+  if(http_vuln_check(port:port, url:url,pattern:"root:.*:0:[01]:")) {
+     
+    security_hole(port:port);
+    exit(0);
+
+  }
+}
+
+exit(0);
+


Property changes on: trunk/openvas-plugins/scripts/gb_mybackup_08_10.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Added: trunk/openvas-plugins/scripts/gb_servu_42523.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_servu_42523.nasl	2010-08-30 14:59:25 UTC (rev 8923)
+++ trunk/openvas-plugins/scripts/gb_servu_42523.nasl	2010-08-31 12:30:50 UTC (rev 8924)
@@ -0,0 +1,97 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# Serv-U Denial of Service and Security Bypass Vulnerabilities
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2010 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(100767);
+ script_bugtraq_id(42523);
+ script_version ("1.0-$Revision$");
+
+ script_name("Serv-U Denial of Service and Security Bypass Vulnerabilities");
+
+desc = "Overview:
+Serv-U is prone to denial-of-service and security-bypass
+vulnerabilities.
+
+Exploiting these issues can allow attackers to create directories
+without having sufficient permissions, or crash the affected
+application, resulting in denial-of-service conditions.
+
+Versions prior to Serv-U 10.2.0.0 are vulnerable.
+
+Solution:
+Updates are available. Please see the references for more information.
+
+References:
+https://www.securityfocus.com/bid/42523
+http://www.serv-u.com/releasenotes/
+http://www.serv-u.com/";
+
+ script_tag(name:"risk_factor", value:"Medium");
+ script_description(desc);
+ script_summary("Determine if installed Serv-U version is vulnerable");
+ script_category(ACT_GATHER_INFO);
+ script_family("FTP");
+ script_copyright("This script is Copyright (C) 2010 Greenbone Networks GmbH");
+ script_dependencies("gb_rhinosoft_serv-u_detect.nasl");
+ script_require_ports("Services/ftp", 21);
+ exit(0);
+}
+
+include("ftp_func.inc");
+include("version_func.inc");
+
+port = get_kb_item("Services/ftp");
+if(!port){
+  port = 21;
+}
+
+if(get_kb_item('ftp/'+port+'/broken'))exit(0);
+
+if(!get_port_state(port)){
+  exit(0);
+}
+
+if(!version = get_kb_item(string("ftp/", port, "/Serv-U"))) {
+ if(!version = get_kb_item(string("Serv-U/FTP/Ver"))) {
+  exit(0);
+ }  
+}  
+
+if(!isnull(version[1])) {
+  vers = version[1];
+}  
+
+if(!isnull(vers)) {
+
+    if(version_is_less(version:vers, test_version:"10.2") ) {
+        security_warning(port: port);
+        exit(0);
+    }
+}
+
+exit(0);
+


Property changes on: trunk/openvas-plugins/scripts/gb_servu_42523.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision



More information about the Openvas-commits mailing list