[Openvas-commits] r12126 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Wed Nov 16 13:25:06 CET 2011


Author: mime
Date: 2011-11-16 13:24:56 +0100 (Wed, 16 Nov 2011)
New Revision: 12126

Added:
   trunk/openvas-plugins/scripts/gb_centreon_50568.nasl
   trunk/openvas-plugins/scripts/gb_dlguard_50650.nasl
   trunk/openvas-plugins/scripts/gb_sit_50632.nasl
Modified:
   trunk/openvas-plugins/ChangeLog
Log:
Added new plugins

Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2011-11-16 09:25:27 UTC (rev 12125)
+++ trunk/openvas-plugins/ChangeLog	2011-11-16 12:24:56 UTC (rev 12126)
@@ -1,5 +1,12 @@
 2011-11-16  Michael Meyer <michael.meyer at greenbone.net>
 
+	* scripts/gb_sit_50632.nasl,
+	scripts/gb_dlguard_50650.nasl,
+	scripts/gb_centreon_50568.nasl:
+	Added new plugins.
+
+2011-11-16  Michael Meyer <michael.meyer at greenbone.net>
+
 	* scripts/gb_fedora_2011_13636_puppet_fc15.nasl,
 	scripts/gb_ubuntu_USN_1217_1.nasl,
 	scripts/gb_phpldapadmin_50331.nasl,

Added: trunk/openvas-plugins/scripts/gb_centreon_50568.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_centreon_50568.nasl	2011-11-16 09:25:27 UTC (rev 12125)
+++ trunk/openvas-plugins/scripts/gb_centreon_50568.nasl	2011-11-16 12:24:56 UTC (rev 12126)
@@ -0,0 +1,84 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# Centreon 'command_name' Parameter Remote Command Execution Vulnerability
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(103338);
+ script_bugtraq_id(50568);
+ script_version ("$Revision$");
+
+ script_name("Centreon 'command_name' Parameter Remote Command Execution Vulnerability");
+
+desc = "Overview:
+Centreon is prone to a remote command-injection vulnerability.
+
+Attackers can exploit this issue to execute arbitrary commands in the
+context of the application.
+
+Centreon 2.3.1 is affected; other versions may also be vulnerable.
+
+Solution:
+Updates are available. Please see the references for more information.
+
+References:
+http://www.securityfocus.com/bid/50568
+http://www.centreon.com/
+https://www.trustwave.com/spiderlabs/advisories/TWSL2011-017.txt";
+
+ script_tag(name:"risk_factor", value:"Medium");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-11-16 09:31:56 +0100 (Wed, 16 Nov 2011)");
+ script_description(desc);
+ script_summary("Determine if installed Cenreon version is vulnerable");
+ script_category(ACT_GATHER_INFO);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2011 Greenbone Networks GmbH");
+ script_dependencies("centreon_detect.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+include("http_func.inc");
+include("host_details.inc");
+include("http_keepalive.inc");
+include("version_func.inc");
+
+port = get_http_port(default:80);
+if(!get_port_state(port))exit(0);
+
+if (!can_host_php(port:port)) exit(0);
+
+if(vers = get_version_from_kb(port:port,app:"centreon")) {
+
+  if(version_is_less_equal(version: vers, test_version: "2.3.1")) {
+      security_warning(port:port);
+      exit(0);
+  }
+
+}
+
+exit(0);


Property changes on: trunk/openvas-plugins/scripts/gb_centreon_50568.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision Date

Added: trunk/openvas-plugins/scripts/gb_dlguard_50650.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_dlguard_50650.nasl	2011-11-16 09:25:27 UTC (rev 12125)
+++ trunk/openvas-plugins/scripts/gb_dlguard_50650.nasl	2011-11-16 12:24:56 UTC (rev 12126)
@@ -0,0 +1,87 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# DLGuard 'index.php' Cross Site Scripting Vulnerability
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(103340);
+ script_bugtraq_id(50650);
+ script_version ("$Revision$");
+
+ script_name("DLGuard 'index.php' Cross Site Scripting Vulnerability");
+
+desc = "Overview:
+DLGuard is prone to a cross-site scripting vulnerability because it
+fails to properly sanitize user-supplied input.
+
+An attacker may leverage this issue to execute arbitrary script code
+in the browser of an unsuspecting user in the context of the affected
+site. This may allow the attacker to steal cookie-based authentication
+credentials and launch other attacks.
+
+References:
+http://www.securityfocus.com/bid/50650
+http://www.dlguard.com/dlginfo/index.php";
+
+ script_tag(name:"risk_factor", value:"Medium");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-11-16 11:40:52 +0100 (Wed, 16 Nov 2011)");
+ script_description(desc);
+ script_summary("Determine if DLGuard is prone to a cross-site scripting vulnerability");
+ script_category(ACT_ATTACK);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2011 Greenbone Networks GmbH");
+ script_dependencies("find_service.nes", "http_version.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+include("http_func.inc");
+include("host_details.inc");
+include("http_keepalive.inc");
+include("global_settings.inc");
+   
+port = get_http_port(default:80);
+if(!get_port_state(port))exit(0);
+
+if(!can_host_php(port:port))exit(0);
+
+dirs = make_list("/dlguard/cart/","/dlg/cart","/store/dlg/cart","/cbdm/cart",cgi_dirs());
+
+foreach dir (dirs) {
+   
+  url = string(dir,'/index.php?page=1&c=&searchCart="><script>alert(/openvas-xss-test/)</script>'); 
+
+  if(http_vuln_check(port:port, url:url,pattern:"<script>alert\(/openvas-xss-test/\)</script>",check_header:TRUE,extra_check:"Powered by .*DLGuard")) {
+     
+    security_warning(port:port);
+    exit(0);
+
+  }
+}
+
+exit(0);
+


Property changes on: trunk/openvas-plugins/scripts/gb_dlguard_50650.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision Date

Added: trunk/openvas-plugins/scripts/gb_sit_50632.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_sit_50632.nasl	2011-11-16 09:25:27 UTC (rev 12125)
+++ trunk/openvas-plugins/scripts/gb_sit_50632.nasl	2011-11-16 12:24:56 UTC (rev 12126)
@@ -0,0 +1,95 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# Support Incident Tracker (SiT!) Multiple Input Validation Vulnerabilities
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(103339);
+ script_bugtraq_id(50632);
+ script_cve_id("CVE-2011-3829","CVE-2011-3830","CVE-2011-3831","CVE-2011-3832","CVE-2011-3833");
+ script_version ("$Revision$");
+
+ script_name("Support Incident Tracker (SiT!) Multiple Input Validation Vulnerabilities");
+
+desc = "Overview:
+Support Incident Tracker (SiT!) is prone to the following input-
+validation vulnerabilities:
+
+1. A cross-site scripting vulnerability
+2. An SQL-injection vulnerability
+3. A PHP code-injection vulnerability
+4. A path-disclosure vulnerability
+5. An arbitrary-file-upload vulnerability
+
+Exploiting these issues could allow an attacker to execute arbitrary
+code, steal cookie-based authentication credentials, compromise the
+application, access or modify data, or exploit latent vulnerabilities
+in the underlying database. Access to sensitive data may also be used
+to launch further attacks against a vulnerable computer.
+
+Support Incident Tracker (SiT!) 3.65 is vulnerable; other versions may
+also be affected.
+
+References:
+http://www.securityfocus.com/bid/50632
+http://sitracker.sourceforge.net
+http://secunia.com/secunia_research/2011-78/
+http://secunia.com/secunia_research/2011-76/
+http://secunia.com/secunia_research/2011-79/
+http://secunia.com/secunia_research/2011-75/
+http://secunia.com/secunia_research/2011-77/";
+
+ script_tag(name:"risk_factor", value:"Medium");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-11-16 11:22:53 +0100 (Wed, 16 Nov 2011)");
+ script_description(desc);
+ script_summary("Determine if installed Support Incident Tracker version is vulnerable");
+ script_category(ACT_GATHER_INFO);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2011 Greenbone Networks GmbH");
+ script_dependencies("support_incident_tracker_detect.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+include("http_func.inc");
+include("host_details.inc");
+include("http_keepalive.inc");
+include("version_func.inc");
+
+port = get_http_port(default:80);
+if(!get_port_state(port))exit(0);
+
+if(vers = get_version_from_kb(port:port,app:"support_incident_tracker")) {
+
+  if(version_is_equal(version: vers, test_version: "3.65")) {
+      security_warning(port:port);
+      exit(0);
+  }
+
+}
+
+exit(0);


Property changes on: trunk/openvas-plugins/scripts/gb_sit_50632.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision Date



More information about the Openvas-commits mailing list