[Openvas-commits] r11455 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Wed Aug 17 15:40:24 CEST 2011


Author: mime
Date: 2011-08-17 15:40:19 +0200 (Wed, 17 Aug 2011)
New Revision: 11455

Added:
   trunk/openvas-plugins/scripts/gb_aeromail_48510.nasl
   trunk/openvas-plugins/scripts/gb_aeromail_detect.nasl
   trunk/openvas-plugins/scripts/gb_ingate_firewall_48567.nasl
   trunk/openvas-plugins/scripts/gb_ingate_firewall_detect.nasl
   trunk/openvas-plugins/scripts/gb_ingate_siparator_48567.nasl
   trunk/openvas-plugins/scripts/gb_ingate_siparator_detect.nasl
   trunk/openvas-plugins/scripts/gb_tomcat_49143.nasl
Modified:
   trunk/openvas-plugins/ChangeLog
   trunk/openvas-plugins/scripts/gb_tomcat_49147.nasl
Log:
Added new plugins. Exit if report_paranoia is < 2.

Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2011-08-16 18:57:38 UTC (rev 11454)
+++ trunk/openvas-plugins/ChangeLog	2011-08-17 13:40:19 UTC (rev 11455)
@@ -1,3 +1,17 @@
+2011-08-17  Michael Meyer <michael.meyer at greenbone.net>
+
+	* scripts/gb_aeromail_detect.nasl,
+	scripts/gb_ingate_firewall_detect.nasl,
+	scripts/gb_ingate_siparator_48567.nasl,
+	scripts/gb_ingate_firewall_48567.nasl,
+	scripts/gb_tomcat_49143.nasl,
+	scripts/gb_ingate_siparator_detect.nasl,
+	scripts/gb_aeromail_48510.nasl:
+	Added new plugins.
+
+	* scripts/gb_tomcat_49147.nasl:
+	Exit if report_paranoia is < 2.
+
 2011-08-16  Michael Meyer <michael.meyer at greenbone.net>
 
 	* scripts/gb_oscommerce_malware.nasl:

Added: trunk/openvas-plugins/scripts/gb_aeromail_48510.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_aeromail_48510.nasl	2011-08-16 18:57:38 UTC (rev 11454)
+++ trunk/openvas-plugins/scripts/gb_aeromail_48510.nasl	2011-08-17 13:40:19 UTC (rev 11455)
@@ -0,0 +1,89 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# AeroMail Cross Site Request Forgery, HTML Injection and Cross Site Scripting Vulnerabilities
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(103205);
+ script_bugtraq_id(48510);
+ script_version ("1.0-$Revision$");
+
+ script_name("AeroMail Cross Site Request Forgery, HTML Injection and Cross Site Scripting Vulnerabilities");
+
+desc = "Overview:
+AeroMail is prone to multiple remote vulnerabilities, including:
+
+1. A cross-site scripting vulnerability.
+
+2. Multiple HTML-injection vulnerabilities.
+
+3. Multiple cross-site request forgery vulnerabilities.
+
+The attacker can exploit the cross-site scripting issue to execute
+arbitrary script code in the context of the vulnerable site,
+potentially allowing the attacker to steal cookie-based authentication
+credentials. The attacker may also be perform certain administrative
+functions and delete arbitrary files. Other attacks are also possible.
+
+Solution:
+A third party patch is available. Please see the references for
+details.
+
+References:
+http://www.securityfocus.com/bid/48510
+http://www.nicolaas.net/aeromail/index.php?page=index";
+
+ script_tag(name:"risk_factor", value:"Medium");
+ script_description(desc);
+ script_summary("Determine if installed AeroMail version is vulnerable");
+ script_category(ACT_GATHER_INFO);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2011 Greenbone Networks GmbH");
+ script_dependencies("gb_aeromail_detect.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+include("http_func.inc");
+include("host_details.inc");
+include("http_keepalive.inc");
+include("version_func.inc");
+
+port = get_http_port(default:80);
+if(!get_port_state(port))exit(0);
+
+if (!can_host_php(port:port)) exit(0);
+
+if(vers = get_version_from_kb(port:port,app:"AeroMail")) {
+
+  if(version_is_equal(version: vers, test_version: "2.80")) {
+      security_warning(port:port);
+      exit(0);
+  }
+
+}
+
+exit(0);


Property changes on: trunk/openvas-plugins/scripts/gb_aeromail_48510.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Added: trunk/openvas-plugins/scripts/gb_aeromail_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_aeromail_detect.nasl	2011-08-16 18:57:38 UTC (rev 11454)
+++ trunk/openvas-plugins/scripts/gb_aeromail_detect.nasl	2011-08-17 13:40:19 UTC (rev 11455)
@@ -0,0 +1,116 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# AeroMail Detection
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+# need desc here to modify it later in script.
+desc = "Overview:
+This host is running AeroMail, a web-based e-mail client written in
+PHP.
+
+See also:
+http://www.nicolaas.net/aeromail/";
+
+if (description)
+{
+ 
+ script_tag(name:"risk_factor", value:"None");
+ script_id(103204);
+ script_version ("1.0-$Revision$");
+
+ script_name("AeroMail Detection");
+ script_description(desc);
+ script_summary("Checks for the presence of AeroMail");
+ script_category(ACT_GATHER_INFO);
+ script_family("Service detection");
+ script_copyright("This script is Copyright (C) 2011 Greenbone Networks GmbH");
+ script_dependencies("find_service.nes", "http_version.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+
+include("http_func.inc");
+include("http_keepalive.inc");
+include("global_settings.inc");
+
+port = get_http_port(default:80);
+
+if(!get_port_state(port))exit(0);
+if(!can_host_php(port:port))exit(0);
+
+dirs = make_list("/aeromail","/mail",cgi_dirs());
+
+foreach dir (dirs) {
+
+ url = string(dir, "/index.php");
+ req = http_get(item:url, port:port);
+ buf = http_keepalive_send_recv(port:port, data:req, bodyonly:FALSE);
+ if( buf == NULL )continue;
+
+ if(egrep(pattern: 'realm="AeroMail"', string: buf, icase: FALSE))
+ {
+     if(strlen(dir)>0) {
+        install=dir;
+     } else {
+        install=string("/");
+     }
+
+    vers = string("unknown");
+    ### try to get version 
+    version = eregmatch(string: buf, pattern: "AeroMail ([0-9.]+)<",icase:TRUE);
+
+    if ( !isnull(version[1]) ) {
+       vers=chomp(version[1]);
+    }
+
+    set_kb_item(name: string("www/", port, "/AeroMail"), value: string(vers," under ",install));
+
+    if(vers == "unknown") {
+      set_kb_item(name: string("cpe:/a:aeromail:aeromail"), value: TRUE);
+    } else {
+      set_kb_item(name: string("cpe:/a:aeromail:aeromail:",vers), value: TRUE);
+    }  
+
+    info = string("aeromail/\n\nAeroMail Version '");
+    info += string(vers);
+    info += string("' was detected on the remote host in the following directory(s):\n\n");
+    info += string(install, "\n");
+
+    desc = ereg_replace(
+        string:desc,
+        pattern:"aeromail/$",
+        replace:info
+    );
+
+       if(report_verbosity > 0) {
+         security_note(port:port,data:desc);
+       }
+       exit(0);
+
+ }
+}
+exit(0);
+


Property changes on: trunk/openvas-plugins/scripts/gb_aeromail_detect.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Added: trunk/openvas-plugins/scripts/gb_ingate_firewall_48567.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ingate_firewall_48567.nasl	2011-08-16 18:57:38 UTC (rev 11454)
+++ trunk/openvas-plugins/scripts/gb_ingate_firewall_48567.nasl	2011-08-17 13:40:19 UTC (rev 11455)
@@ -0,0 +1,75 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# Ingate Firewall SIP Module Remote Denial of Service Vulnerability
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(103208);
+ script_bugtraq_id(48567);
+ script_version ("1.0-$Revision$");
+
+ script_name("Ingate Firewall SIP Module Remote Denial of Service Vulnerability");
+
+desc = "Overview:
+Ingate Firewall is prone to a denial-of-service vulnerability.
+
+An attacker can exploit this issue to cause SIP modules to reset,
+denying service to legitimate users.
+
+Solution:
+Updates are available. Please see the references for details.
+
+References:
+http://www.securityfocus.com/bid/48567
+http://www.ingate.com/
+http://www.ingate.com/Relnote.php?ver=492";
+
+ script_tag(name:"risk_factor", value:"High");
+ script_description(desc);
+ script_summary("Determine if Ingate Firewall version is vulnerable");
+ script_category(ACT_GATHER_INFO);
+ script_family("Denial of Service");
+ script_copyright("This script is Copyright (C) 2011 Greenbone Networks GmbH");
+ script_dependencies("gb_ingate_firewall_detect.nasl");
+ script_require_ports("Services/udp/sip");
+ exit(0);
+}
+
+include("version_func.inc");
+
+port = get_kb_item("Services/udp/sip");
+if (!port) port = 5060;
+if(!(get_udp_port_state(port)))exit(0);
+
+if(!version = get_kb_item(string(port,"/Ingate_Firewall")))exit(0);
+
+if(version_is_less(version:version, test_version:"4.9.2")) {
+
+  security_hole(port:port);
+  exit(0);
+
+}  
+
+exit(0);


Property changes on: trunk/openvas-plugins/scripts/gb_ingate_firewall_48567.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Added: trunk/openvas-plugins/scripts/gb_ingate_firewall_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ingate_firewall_detect.nasl	2011-08-16 18:57:38 UTC (rev 11454)
+++ trunk/openvas-plugins/scripts/gb_ingate_firewall_detect.nasl	2011-08-17 13:40:19 UTC (rev 11455)
@@ -0,0 +1,79 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# inGate Firewall Detection
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+# need desc here to modify it later in script.
+desc = "Overview:
+This host is a inGate Firewall.
+
+See also:
+http://www.ingate.com/Products_firewalls.php";
+
+if (description)
+{
+ 
+ script_tag(name:"risk_factor", value:"None");
+ script_id(103207);
+ script_version ("1.0-$Revision$");
+
+ script_name("inGate Firewall Detection");
+ script_description(desc);
+ script_summary("Checks for the presence of inGate Firewall");
+ script_category(ACT_GATHER_INFO);
+ script_family("Service detection");
+ script_copyright("This script is Copyright (C) 2011 Greenbone Networks GmbH");
+ script_dependencies("sip_detection.nasl");
+ script_require_ports("Services/udp/sip");
+ exit(0);
+}
+
+port = get_kb_item("Services/udp/sip");
+if (!port) port = 5060;
+if(!(get_udp_port_state(port)))exit(0);
+
+banner =  get_kb_item(string("sip/banner/",port));
+if(!banner || "Ingate-Firewall/" >!< banner)exit(0);
+
+vers = "unknown";
+
+version = eregmatch(pattern:"Ingate-Firewall/([0-9.]+)", string:banner);
+if(!isnull(version[1])) vers = version[1];
+
+set_kb_item(name:string(port,"/Ingate_Firewall"),value:vers);
+
+if(vers == "unknown") {
+  set_kb_item(name:string("cpe:/h:ingate:ingate_firewall"),value:TRUE);
+} else {
+  set_kb_item(name:string("cpe:/h:ingate:ingate_firewall:",vers),value:TRUE);
+}
+
+desc = string(desc,"\n\ninGate Firewall version '",vers,"' was detected.\n");
+
+security_note(port:port,data:desc);
+
+exit(0);
+
+ 
+  


Property changes on: trunk/openvas-plugins/scripts/gb_ingate_firewall_detect.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Added: trunk/openvas-plugins/scripts/gb_ingate_siparator_48567.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ingate_siparator_48567.nasl	2011-08-16 18:57:38 UTC (rev 11454)
+++ trunk/openvas-plugins/scripts/gb_ingate_siparator_48567.nasl	2011-08-17 13:40:19 UTC (rev 11455)
@@ -0,0 +1,76 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# Ingate SIParator SIP Module Remote Denial of Service Vulnerability
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(103209);
+ script_bugtraq_id(48567);
+ script_version ("1.0-$Revision$");
+
+ script_name("Ingate SIParator SIP Module Remote Denial of Service Vulnerability");
+
+desc = "Overview:
+Ingate SIParator is prone to a denial-of-service vulnerability.
+
+An attacker can exploit this issue to cause SIP modules to reset,
+denying service to legitimate users.
+
+Solution:
+Updates are available. Please see the references for details.
+
+References:
+http://www.securityfocus.com/bid/48567
+http://www.ingate.com/
+http://www.ingate.com/Relnote.php?ver=492";
+
+ script_tag(name:"risk_factor", value:"High");
+ script_description(desc);
+ script_summary("Determine if Ingate SIParator version is vulnerable");
+ script_category(ACT_GATHER_INFO);
+ script_family("Denial of Service");
+ script_copyright("This script is Copyright (C) 2011 Greenbone Networks GmbH");
+ script_dependencies("gb_ingate_siparator_detect.nasl");
+ script_require_ports("Services/www", 80);
+ exit(0);
+}
+
+include("version_func.inc");
+include("http_func.inc");
+
+port = get_http_port(default:80);
+if(!get_port_state(port))exit(0);
+
+if(!version = get_kb_item(string(port,"/Ingate_SIParator")))exit(0);
+
+if(version_is_less(version:version, test_version:"4.9.2")) {
+
+  security_hole(port:port);
+  exit(0);
+
+}
+
+exit(0);
+


Property changes on: trunk/openvas-plugins/scripts/gb_ingate_siparator_48567.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Added: trunk/openvas-plugins/scripts/gb_ingate_siparator_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_ingate_siparator_detect.nasl	2011-08-16 18:57:38 UTC (rev 11454)
+++ trunk/openvas-plugins/scripts/gb_ingate_siparator_detect.nasl	2011-08-17 13:40:19 UTC (rev 11455)
@@ -0,0 +1,82 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# inGate SIParator Detection
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+# need desc here to modify it later in script.
+desc = "Overview:
+This host is a inGate SIParator, a device that connects to an
+existing network firewall to seamlessly enable SIP Communications.
+
+See also:
+http://www.ingate.com/Products_siparators.php";
+
+if (description)
+{
+ 
+ script_tag(name:"risk_factor", value:"None");
+ script_id(103206);
+ script_version ("1.0-$Revision$");
+
+ script_name("inGate SIParator Detection");
+ script_description(desc);
+ script_summary("Checks for the presence of inGate SIParator");
+ script_category(ACT_GATHER_INFO);
+ script_family("Service detection");
+ script_copyright("This script is Copyright (C) 2011 Greenbone Networks GmbH");
+ script_dependencies("find_service.nes");
+ script_require_ports("Services/www", 80);
+ exit(0);
+}
+
+
+include("http_func.inc");
+include("http_keepalive.inc");
+
+port = get_http_port(default:80);
+if(!get_port_state(port))exit(0);
+
+banner = get_http_banner(port: port);
+
+if(!banner || "Server: Ingate-SIParator/" >!< banner)exit(0); 
+
+vers = "unknown";
+version = eregmatch(pattern:"Server: Ingate-SIParator/([0-9.]+)",string:banner);
+
+if(!isnull(version[1]))vers = version[1];
+
+set_kb_item(name:string(port,"/Ingate_SIParator"),value:vers);
+
+if(vers == "unknown") {
+  set_kb_item(name:string("cpe:/h:ingate:siparator"),value:TRUE);
+} else {
+  set_kb_item(name:string("cpe:/h:ingate:siparator:",vers),value:TRUE);
+}  
+
+desc = string(desc,"\n\ninGate SIParator version '",vers,"' was detected.\n");
+
+security_note(port:port,data:desc);
+
+exit(0);
+


Property changes on: trunk/openvas-plugins/scripts/gb_ingate_siparator_detect.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Added: trunk/openvas-plugins/scripts/gb_tomcat_49143.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_tomcat_49143.nasl	2011-08-16 18:57:38 UTC (rev 11454)
+++ trunk/openvas-plugins/scripts/gb_tomcat_49143.nasl	2011-08-17 13:40:19 UTC (rev 11455)
@@ -0,0 +1,106 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# Apache Commons Daemon 'jsvc' Information Disclosure Vulnerability
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(103202);
+ script_bugtraq_id(49143);
+ script_cve_id("CVE-2011-2729");
+ script_version ("1.0-$Revision$");
+
+ script_name("Apache Commons Daemon 'jsvc' Information Disclosure Vulnerability");
+
+desc = "Overview:
+Apache Commons Daemon is prone to a remote information-disclosure
+vulnerability that affects the 'jsvc' library.
+
+Remote attackers can exploit this issue to gain access to files and
+directories owned by the superuser, through applications using the
+affected library. This allows attackers to obtain sensitive
+information that may aid in further attacks.
+
+Note: This issue affects applications running on Linux operating
+      systems only.
+
+Versions prior to Commons Daemon 1.0.7 are vulnerable.
+
+The following Apache Tomcat versions which use the affected library
+are vulnerable:
+
+Tomcat 7.0.0 through 7.0.19 Tomcat 6.0.30 through 6.0.32 Tomcat 5.5.32
+through 5.5.33
+
+Solution:
+Updates are available. Please see the references for more information.
+
+References:
+http://www.securityfocus.com/bid/49143
+http://mail-archives.apache.org/mod_mbox/tomcat-announce/201108.mbox/%3C4E45221D.1020306@apache.org%3E
+http://commons.apache.org/daemon/
+http://tomcat.apache.org/security-5.html
+http://tomcat.apache.org/security-6.html
+http://tomcat.apache.org/security-7.html
+http://tomcat.apache.org/
+http://commons.apache.org/daemon/jsvc.html";
+
+ script_tag(name:"risk_factor", value:"Medium");
+ script_description(desc);
+ script_summary("Determine if installe Tomcat version is vulnerable");
+ script_category(ACT_GATHER_INFO);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2011 Greenbone Networks GmbH");
+ script_dependencies("gb_apache_tomcat_detect.nasl", "os_fingerprint.nasl");
+ script_require_ports("Services/www", 8080);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+include("http_func.inc");
+include("host_details.inc");
+include("http_keepalive.inc");
+include("version_func.inc");
+
+if(report_paranoia < 2) exit(0); # this nvt is pront to FP
+if (host_runs("Linux") == "no") exit(0); #  This issue affects applications running on Linux operating systems only.
+
+port = get_http_port(default:8080);
+if(!get_port_state(port))exit(0);
+
+if(!vers = get_kb_item(string("www/", port, "/ApacheTomcat")))exit(0);
+if(!isnull(vers)) {
+
+  if(version_in_range(version:vers, test_version:"7.0",    test_version2:"7.0.19") ||
+     version_in_range(version:vers, test_version:"6.0.30", test_version2:"6.0.32") ||
+     version_in_range(version:vers, test_version:"5.5.32", test_version2:"5.5.33")) {
+    
+      security_warning(port:port);
+      exit(0);
+
+  }
+
+}  
+
+exit(0);


Property changes on: trunk/openvas-plugins/scripts/gb_tomcat_49143.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Modified: trunk/openvas-plugins/scripts/gb_tomcat_49147.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_tomcat_49147.nasl	2011-08-16 18:57:38 UTC (rev 11454)
+++ trunk/openvas-plugins/scripts/gb_tomcat_49147.nasl	2011-08-17 13:40:19 UTC (rev 11455)
@@ -67,6 +67,8 @@
 include("http_keepalive.inc");
 include("version_func.inc");
 
+if(report_paranoia < 2) exit(0); # this nvt is pront to FP
+
 port = get_http_port(default:8080);
 if(!get_port_state(port))exit(0);
 



More information about the Openvas-commits mailing list