[Openvas-commits] r12223 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Wed Nov 30 13:43:48 CET 2011


Author: mime
Date: 2011-11-30 13:43:41 +0100 (Wed, 30 Nov 2011)
New Revision: 12223

Added:
   trunk/openvas-plugins/scripts/gb_manx_50839.nasl
   trunk/openvas-plugins/scripts/gb_sit_50742.nasl
   trunk/openvas-plugins/scripts/gb_zabbix_50803.nasl
Modified:
   trunk/openvas-plugins/ChangeLog
   trunk/openvas-plugins/scripts/gb_apache_49957.nasl
Log:
Added new plugins. Updatef for CVE-2011-4317

Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2011-11-30 11:34:06 UTC (rev 12222)
+++ trunk/openvas-plugins/ChangeLog	2011-11-30 12:43:41 UTC (rev 12223)
@@ -1,3 +1,13 @@
+2011-11-30  Michael Meyer <michael.meyer at greenbone.net>
+
+	* scripts/gb_sit_50742.nasl,
+	scripts/gb_zabbix_50803.nasl,
+	scripts/gb_manx_50839.nasl:
+	Added new plugins.
+
+	* scripts/gb_apache_49957.nasl:
+	Updated for CVE-2011-4317.
+
 2011-11-29  Henri Doreau <henri.doreau at greenbone.net>
 
 	* scripts/secpod_symantec_im_manager_xss_vuln.nasl,

Modified: trunk/openvas-plugins/scripts/gb_apache_49957.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_apache_49957.nasl	2011-11-30 11:34:06 UTC (rev 12222)
+++ trunk/openvas-plugins/scripts/gb_apache_49957.nasl	2011-11-30 12:43:41 UTC (rev 12223)
@@ -27,13 +27,11 @@
 if (description)
 {
  script_id(103293);
- script_version("$Revision$");
- script_tag(name:"last_modification", value:"$Date$");
- script_tag(name:"creation_date", value:"2011-10-11 17:46:33 +0200 (Tue, 11 Oct 2011)");
- script_bugtraq_id(49957);
- script_cve_id("CVE-2011-3368");
+ script_bugtraq_id(49957,50802);
+ script_cve_id("CVE-2011-3368","CVE-2011-4317");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"risk_factor", value:"Medium");
+ script_version ("$Revision$");
 
  script_name("Apache HTTP Server 'mod_proxy' Reverse Proxy Information Disclosure Vulnerability");
 
@@ -91,5 +89,14 @@
   exit(0);
   
 }  
-  
+
+# CVE-2011-4317
+req = string("GET @localhost::65535 HTTP/1.0\r\n\r\n");
+result = http_keepalive_send_recv(port:port, data:req, bodyonly:FALSE);
+
+if(ereg(pattern:"HTTP/1.. 503", string:result)) {
+  security_warning(port:port);
+  exit(0);
+}  
+
 exit(0);

Added: trunk/openvas-plugins/scripts/gb_manx_50839.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_manx_50839.nasl	2011-11-30 11:34:06 UTC (rev 12222)
+++ trunk/openvas-plugins/scripts/gb_manx_50839.nasl	2011-11-30 12:43:41 UTC (rev 12223)
@@ -0,0 +1,96 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# Manx Multiple Cross Site Scripting and Directory Traversal Vulnerabilities
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or
+# modify it under the terms of the GNU General Public License
+# as published by the Free Software Foundation; either version 2
+# of the License, or (at your option) any later version.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(103347);
+ script_bugtraq_id(50839);
+ script_version ("$Revision$");
+
+ script_name("Manx Multiple Cross Site Scripting and Directory Traversal Vulnerabilities");
+
+desc = "Overview:
+Manx is prone to multiple cross-site scripting and directory-traversal
+vulnerabilities because it fails to sufficiently sanitize user-
+supplied input.
+
+Exploiting these issues will allow an attacker to execute arbitrary
+script code in the browser of an unsuspecting user in the context of
+the affected site and to view arbitrary local files and directories
+within the context of the webserver. This may let the attacker steal
+cookie-based authentication credentials. Other harvested information
+may aid in launching further attacks.
+
+Manx 1.0.1 is vulnerable; other versions may also be affected.
+
+
+References:
+http://www.securityfocus.com/bid/50839
+http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5058.php
+http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5060.php
+http://manx.jovascript.com/
+";
+
+ script_tag(name:"risk_factor", value:"Medium");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-11-30 11:09:07 +0100 (Wed, 30 Nov 2011)");
+ script_description(desc);
+ script_summary("Determine if installed Manx is vulnerable");
+ script_category(ACT_ATTACK);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2011 Greenbone Networks GmbH");
+ script_dependencies("find_service.nes", "http_version.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+include("http_func.inc");
+include("host_details.inc");
+include("http_keepalive.inc");
+include("global_settings.inc");
+   
+port = get_http_port(default:80);
+if(!get_port_state(port))exit(0);
+if(!can_host_php(port:port))exit(0);
+
+dirs = make_list("/manx");#,cgi_dirs());
+
+foreach dir (dirs) {
+   
+  url = string(dir, '/admin/login.php/"onmouseover=alert("openvas-xss-test")>'); 
+
+  if(http_vuln_check(port:port, url:url,pattern:'form action=""onmouseover=alert\\("openvas-xss-test"\\)>',check_header:TRUE)) {
+     
+    security_warning(port:port);
+    exit(0);
+
+  }
+}
+
+exit(0);
+


Property changes on: trunk/openvas-plugins/scripts/gb_manx_50839.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision Date

Added: trunk/openvas-plugins/scripts/gb_sit_50742.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_sit_50742.nasl	2011-11-30 11:34:06 UTC (rev 12222)
+++ trunk/openvas-plugins/scripts/gb_sit_50742.nasl	2011-11-30 12:43:41 UTC (rev 12223)
@@ -0,0 +1,87 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# Support Incident Tracker 'translate.php' Remote Code Execution Vulnerability
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or
+# modify it under the terms of the GNU General Public License
+# as published by the Free Software Foundation; either version 2
+# of the License, or (at your option) any later version.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(103349);
+ script_bugtraq_id(50742);
+ script_version ("$Revision$");
+
+ script_name("Support Incident Tracker 'translate.php' Remote Code Execution Vulnerability");
+
+desc = "Overview:
+Support Incident Tracker is prone to a remote code-execution
+vulnerability because the application fails to sufficiently sanitize
+user-supplied input.
+
+Exploiting this issue will allow attackers to execute arbitrary PHP
+code within the context of the affected application.
+
+Support Incident Tracker 3.45 to 3.65 is vulnerable; prior versions
+may also be affected.
+
+Solution:
+Updates are available. Please see the references for more information.
+
+References:
+http://www.securityfocus.com/bid/50742
+http://sitracker.sourceforge.net
+http://www.securityfocus.com/archive/1/520577";
+
+ script_tag(name:"risk_factor", value:"Medium");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-11-30 11:40:15 +0100 (Wed, 30 Nov 2011)");
+ script_description(desc);
+ script_summary("Determine if installed Support Incident Tracker version is vulnerable");
+ script_category(ACT_GATHER_INFO);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2011 Greenbone Networks GmbH");
+ script_dependencies("support_incident_tracker_detect.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+include("http_func.inc");
+include("host_details.inc");
+include("http_keepalive.inc");
+include("version_func.inc");
+
+port = get_http_port(default:80);
+if(!get_port_state(port))exit(0);
+
+if (!can_host_php(port:port)) exit(0);
+
+if(vers = get_version_from_kb(port:port,app:"support_incident_tracker")) {
+  if(version_in_range(version: vers, test_version: "3.45", test_version2: "3.65")) {
+      security_warning(port:port);
+      exit(0);
+  }
+
+}
+
+exit(0);


Property changes on: trunk/openvas-plugins/scripts/gb_sit_50742.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision Date

Added: trunk/openvas-plugins/scripts/gb_zabbix_50803.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_zabbix_50803.nasl	2011-11-30 11:34:06 UTC (rev 12222)
+++ trunk/openvas-plugins/scripts/gb_zabbix_50803.nasl	2011-11-30 12:43:41 UTC (rev 12223)
@@ -0,0 +1,92 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# ZABBIX 'only_hostid' Parameter SQL Injection Vulnerability
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or
+# modify it under the terms of the GNU General Public License
+# as published by the Free Software Foundation; either version 2
+# of the License, or (at your option) any later version.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(103348);
+ script_bugtraq_id(50803);
+ script_version ("$Revision$");
+
+ script_name("ZABBIX 'only_hostid' Parameter SQL Injection Vulnerability");
+
+desc = "Overview:
+ZABBIX is prone to an SQL-injection vulnerability because it fails
+to sufficiently sanitize user-supplied data before using it in an
+SQL query.
+
+Exploiting this issue could allow an attacker to compromise the
+application, access or modify data, or exploit latent vulnerabilities
+in the underlying database.
+
+ZABBIX versions 1.8.3 and 1.8.4 are vulnerable.
+
+Solution:
+Updates are available. Please see the references for more details.
+
+References:
+http://www.securityfocus.com/bid/50803
+http://www.zabbix.com/index.php
+https://support.zabbix.com/browse/ZBX-4385";
+
+ script_tag(name:"risk_factor", value:"Medium");
+ script_tag(name:"last_modification", value:"$Date$");
+ script_tag(name:"creation_date", value:"2011-11-30 11:34:16 +0100 (Wed, 30 Nov 2011)");
+ script_description(desc);
+ script_summary("Determine if installed Zabbix version is vulnerable");
+ script_category(ACT_GATHER_INFO);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2011 Greenbone Networks GmbH");
+ script_dependencies("zabbix_detect.nasl","zabbix_web_detect.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+include("http_func.inc");
+include("host_details.inc");
+include("http_keepalive.inc");
+include("version_func.inc");
+include("global_settings.inc");
+
+if ( report_paranoia < 2 ) exit(0); # this nvt is prone to FP
+
+port = get_http_port(default:80);
+if(!get_port_state(port))exit(0);
+
+if (!can_host_php(port:port)) exit(0);
+
+if(vers = get_version_from_kb(port:port,app:"zabbix_client")) {
+
+  if(version_is_equal(version: vers, test_version: "1.8.3") ||
+     version_is_equal(version: vers, test_version: "1.8.4") ) {
+      security_warning(port:port);
+      exit(0);
+  }
+
+}
+
+exit(0);


Property changes on: trunk/openvas-plugins/scripts/gb_zabbix_50803.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision Date



More information about the Openvas-commits mailing list