[Openvas-commits] r11973 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Thu Nov 3 13:32:17 CET 2011


Author: mime
Date: 2011-11-03 13:32:12 +0100 (Thu, 03 Nov 2011)
New Revision: 11973

Added:
   trunk/openvas-plugins/scripts/gb_BestShopPro_50490.nasl
   trunk/openvas-plugins/scripts/gb_efront_50492.nasl
   trunk/openvas-plugins/scripts/gb_setseed_50498.nasl
   trunk/openvas-plugins/scripts/gb_setseed_detect.nasl
Modified:
   trunk/openvas-plugins/ChangeLog
Log:
Added new plugins

Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2011-11-03 11:51:34 UTC (rev 11972)
+++ trunk/openvas-plugins/ChangeLog	2011-11-03 12:32:12 UTC (rev 11973)
@@ -1,3 +1,11 @@
+2011-11-03  Michael Meyer <michael.meyer at greenbone.net>
+
+	* scripts/gb_efront_50492.nasl,
+	scripts/gb_BestShopPro_50490.nasl,
+	scripts/gb_setseed_detect.nasl,
+	scripts/gb_setseed_50498.nasl:
+	Added new plugins.
+
 2011-11-03  Veerendra G.G <veerendragg at secpod.com>
 
 	* scripts/gb_mandriva_MDVSA_2011_162.nasl,

Added: trunk/openvas-plugins/scripts/gb_BestShopPro_50490.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_BestShopPro_50490.nasl	2011-11-03 11:51:34 UTC (rev 11972)
+++ trunk/openvas-plugins/scripts/gb_BestShopPro_50490.nasl	2011-11-03 12:32:12 UTC (rev 11973)
@@ -0,0 +1,87 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# BestShopPro 'str' Parameter Cross Site Scripting and SQL Injection Vulnerabilities
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(103329);
+ script_bugtraq_id(50490);
+ script_version ("$Revision$");
+
+ script_name("BestShopPro 'str' Parameter Cross Site Scripting and SQL Injection Vulnerabilities");
+
+desc = "Overview:
+BestShopPro is prone to cross-site scripting and SQL-injection
+vulnerabilities because it fails to sufficiently sanitize user-
+supplied data.
+
+Exploiting these issues could allow an attacker to steal cookie-
+based authentication credentials, compromise the application,
+access or modify data, or exploit latent vulnerabilities in the
+underlying database.
+
+References:
+http://www.securityfocus.com/bid/50490
+http://www.bst.pl/";
+
+ script_tag(name:"risk_factor", value:"Medium");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-11-03");
+ script_description(desc);
+ script_summary("Determine if installed BestShopPro is vulnerable");
+ script_category(ACT_ATTACK);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2011 Greenbone Networks GmbH");
+ script_dependencies("find_service.nes", "http_version.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+include("http_func.inc");
+include("host_details.inc");
+include("http_keepalive.inc");
+   
+port = get_http_port(default:80);
+if(!get_port_state(port))exit(0);
+
+if(!can_host_php(port:port))exit(0);
+
+dirs = make_list("/bst",cgi_dirs());
+
+foreach dir (dirs) {
+   
+  url = string(dir, "/nowosci.php?a=1&str=%3Cscript%3Ealert(/openvas-xss-test/)%3C/script%3E"); 
+
+  if(http_vuln_check(port:port, url:url,pattern:"<script>alert\(/openvas-xss-test/\)</script>",check_header:TRUE)) {
+     
+    security_warning(port:port);
+    exit(0);
+
+  }
+}
+
+exit(0);
+


Property changes on: trunk/openvas-plugins/scripts/gb_BestShopPro_50490.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision Date

Added: trunk/openvas-plugins/scripts/gb_efront_50492.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_efront_50492.nasl	2011-11-03 11:51:34 UTC (rev 11972)
+++ trunk/openvas-plugins/scripts/gb_efront_50492.nasl	2011-11-03 12:32:12 UTC (rev 11973)
@@ -0,0 +1,91 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# eFront Multiple Cross Site Scripting and SQL Injection Vulnerabilities
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(103328);
+ script_bugtraq_id(50492);
+ script_version ("$Revision$");
+
+ script_name("eFront Multiple Cross Site Scripting and SQL Injection Vulnerabilities");
+
+desc = "Overview:
+eFront is prone to multiple cross-site scripting and SQL-injection
+vulnerabilities because the software fails to sufficiently sanitize
+user-supplied input.
+
+Exploiting these vulnerabilities could allow an attacker to steal
+cookie-based authentication credentials, compromise the application,
+access or modify data, or exploit latent vulnerabilities in the
+underlying database.
+
+eFront 3.6.10 build 11944 is vulnerable; other versions may also
+be affected.
+
+Solution:
+Updates are available. Please see the references for details.
+
+References:
+http://www.securityfocus.com/bid/50492
+http://www.efrontlearning.net/
+https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_efront.html";
+
+ script_tag(name:"risk_factor", value:"Medium");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-11-03");
+ script_description(desc);
+ script_summary("Determine if installed Efront is vulnerable");
+ script_category(ACT_ATTACK);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2011 Greenbone Networks GmbH");
+ script_dependencies("secpod_efront_detect.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+include("http_func.inc");
+include("host_details.inc");
+include("http_keepalive.inc");
+include("version_func.inc");
+   
+port = get_http_port(default:80);
+if(!get_port_state(port))exit(0);
+if(!can_host_php(port:port))exit(0);
+
+if(!dir = get_dir_from_kb(port:port, app:"eFront"))exit(0);
+
+url = string(dir, "/www/index.php/'><script>alert(/openvas-xss-test/);</script>"); 
+
+if(http_vuln_check(port:port, url:url,pattern:"><script>alert\(/openvas-xss-test/\);</script>",check_header:TRUE)) {
+     
+  security_warning(port:port);
+  exit(0);
+
+}
+
+exit(0);
+


Property changes on: trunk/openvas-plugins/scripts/gb_efront_50492.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision Date

Added: trunk/openvas-plugins/scripts/gb_setseed_50498.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_setseed_50498.nasl	2011-11-03 11:51:34 UTC (rev 11972)
+++ trunk/openvas-plugins/scripts/gb_setseed_50498.nasl	2011-11-03 12:32:12 UTC (rev 11973)
@@ -0,0 +1,103 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# SetSeed 'loggedInUser' SQL Injection Vulnerability
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(103327);
+ script_bugtraq_id(50498);
+ script_version ("$Revision$");
+
+ script_name("SetSeed 'loggedInUser' SQL Injection Vulnerability");
+
+desc = "Overview:
+SetSeed is prone to an SQL Injection vulnerability because it fails
+to sufficiently sanitize user-supplied data before using it in an
+SQL query.
+
+Exploiting this issue could allow an attacker to compromise the
+application, access or modify data, or exploit latent vulnerabilities
+in the underlying database implementation.
+
+SetSeed 5.8.20 is vulnerable; other versions may also be affected.
+
+References:
+http://www.securityfocus.com/bid/50498
+http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5053.php
+http://setseed.com/";
+
+ script_tag(name:"risk_factor", value:"Medium");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-11-03");
+ script_description(desc);
+ script_summary("Determine if installed SetSeed is vulnerable");
+ script_category(ACT_ATTACK);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2011 Greenbone Networks GmbH");
+ script_dependencies("gb_setseed_detect.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+include("http_func.inc");
+include("host_details.inc");
+include("http_keepalive.inc");
+include("version_func.inc");
+   
+port = get_http_port(default:80);
+if(!get_port_state(port))exit(0);
+
+if(! dir = get_dir_from_kb(port:port, app: "SetSeed"))exit(0);
+
+url = string(dir, "/");
+req = http_get(item:url, port:port);
+buf = http_keepalive_send_recv(port:port, data:req, bodyonly:FALSE);
+
+session_id = eregmatch(pattern:"Set-Cookie: ([^;]*);",string:buf);
+if(isnull(session_id[1]))exit(0);
+sess = session_id[1];
+
+host = get_host_name();
+
+req = string(
+              "GET /setseed-hub/ HTTP/1.1\r\n",
+              "Cookie: loggedInKey=PYNS9QVWLEBG1E7C9UFCT674DYNW9YJ; loggedInUser=1%27; ",sess,"\r\n",
+              "Host: ",host,"\r\n",
+              "Connection: Keep-alive\r\n",
+              "\r\n\r\n"
+             );
+
+res = http_keepalive_send_recv(port:port,data:req);
+
+if("You have an error in your SQL syntax" >< res) {
+
+  security_warning(port:port);
+  exit(0);
+
+}
+
+exit(0);
+


Property changes on: trunk/openvas-plugins/scripts/gb_setseed_50498.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision Date

Added: trunk/openvas-plugins/scripts/gb_setseed_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_setseed_detect.nasl	2011-11-03 11:51:34 UTC (rev 11972)
+++ trunk/openvas-plugins/scripts/gb_setseed_detect.nasl	2011-11-03 12:32:12 UTC (rev 11973)
@@ -0,0 +1,115 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# SetSeed CMS Detection
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+# need desc here to modify it later in script.
+desc = "Overview:
+This host is running the SetSeed CMS.
+
+See also:
+http://setseed.com";
+
+if (description)
+{
+ 
+ script_tag(name:"risk_factor", value:"None");
+ script_id(103326);
+ script_version ("$Revision$");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-11-03");
+ script_name("SetSeed CMS Detection");
+ script_description(desc);
+ script_summary("Checks for the presence of SetSeed CMS");
+ script_category(ACT_GATHER_INFO);
+ script_family("Service detection");
+ script_copyright("This script is Copyright (C) 2011 Greenbone Networks GmbH");
+ script_dependencies("find_service.nes", "http_version.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+
+include("http_func.inc");
+include("http_keepalive.inc");
+include("global_settings.inc");
+include("cpe.inc");
+include("host_details.inc");
+
+SCRIPT_OID  = "1.3.6.1.4.1.25623.1.0.103326";
+SCRIPT_DESC = "SetSeed CMS Detection";
+
+port = get_http_port(default:80);
+
+if(!get_port_state(port))exit(0);
+if(!can_host_php(port:port))exit(0);
+
+dirs = make_list(cgi_dirs());
+
+foreach dir (dirs) {
+
+ url = string(dir, "/setseed-hub/");
+ req = http_get(item:url, port:port);
+ buf = http_keepalive_send_recv(port:port, data:req, bodyonly:FALSE);
+ if( buf == NULL )continue;
+
+ if(egrep(pattern: "<title>SetSeed Hub", string: buf, icase: TRUE))
+ {
+     if(strlen(dir)>0) {
+        install=dir;
+     } else {
+        install=string("/");
+     }
+
+    vers = string("unknown");
+    ### try to get version 
+    version = eregmatch(string: buf, pattern: "Version: ([0-9.]+)<",icase:TRUE);
+
+    if ( !isnull(version[1]) ) {
+       vers=chomp(version[1]);
+    }
+
+    set_kb_item(name: string("www/", port, "/SetSeed"), value: string(vers," under ",install));
+
+    info = string("com\n\nSetSeed CMS Version '");
+    info += string(vers);
+    info += string("' was detected on the remote host in the following directory(s):\n\n");
+    info += string(install, "\n");
+
+    desc = ereg_replace(
+        string:desc,
+        pattern:"com$",
+        replace:info
+    );
+
+       if(report_verbosity > 0) {
+         security_note(port:port,data:desc);
+       }
+       exit(0);
+
+ }
+}
+exit(0);
+


Property changes on: trunk/openvas-plugins/scripts/gb_setseed_detect.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision Date



More information about the Openvas-commits mailing list