[Openvas-commits] r11549 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Fri Sep 2 13:14:01 CEST 2011


Author: mime
Date: 2011-09-02 13:13:57 +0200 (Fri, 02 Sep 2011)
New Revision: 11549

Added:
   trunk/openvas-plugins/scripts/gb_dienstplan_49412.nasl
   trunk/openvas-plugins/scripts/gb_pandora_fms_49261.nasl
Modified:
   trunk/openvas-plugins/ChangeLog
Log:
Added new plugins

Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2011-09-02 09:43:04 UTC (rev 11548)
+++ trunk/openvas-plugins/ChangeLog	2011-09-02 11:13:57 UTC (rev 11549)
@@ -1,3 +1,9 @@
+2011-09-02  Michael Meyer <michael.meyer at greenbone.net>
+
+	* scripts/gb_dienstplan_49412.nasl,
+	scripts/gb_pandora_fms_49261.nasl:
+	Added new plugins.
+
 2011-09-01  Michael Meyer <michael.meyer at greenbone.net>
 
 	* scripts/gb_netsaro_49390.nasl,

Added: trunk/openvas-plugins/scripts/gb_dienstplan_49412.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_dienstplan_49412.nasl	2011-09-02 09:43:04 UTC (rev 11548)
+++ trunk/openvas-plugins/scripts/gb_dienstplan_49412.nasl	2011-09-02 11:13:57 UTC (rev 11549)
@@ -0,0 +1,96 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# Dienstplan Predictable Random Password Generation Vulnerability
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(103237);
+ script_bugtraq_id(49412);
+ script_version ("1.0-$Revision$");
+
+ script_name("Dienstplan Predictable Random Password Generation Vulnerability");
+
+desc = "Overview:
+Dienstplan is prone to an insecure random password generation
+vulnerability.
+
+Successfully exploiting this issue may allow an attacker to guess
+randomly generated passwords.
+
+Versions prior to Dienstplan 2.3 are vulnerable.
+
+Solution:
+Updates are available. Please see the references for more information.
+
+References:
+http://www.securityfocus.com/bid/49412
+http://www.thomas-gubisch.de/dienstplan.html
+http://archives.neohapsis.com/archives/fulldisclosure/current/0370.html";
+
+ script_tag(name:"risk_factor", value:"Medium");
+ script_description(desc);
+ script_summary("Determine if Dienstplan is prone to an insecure random password generation vulnerability");
+ script_category(ACT_GATHER_INFO);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2011 Greenbone Networks GmbH");
+ script_dependencies("find_service.nes", "http_version.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+include("http_func.inc");
+include("host_details.inc");
+include("http_keepalive.inc");
+include("version_func.inc");
+   
+port = get_http_port(default:80);
+if(!get_port_state(port))exit(0);
+
+if(!can_host_php(port:port))exit(0);
+
+dirs = make_list("/dienstplan",cgi_dirs());
+
+foreach dir (dirs) {
+   
+  url = string(dir, "/?page=login&action=about"); 
+  req = http_get(item:url, port:port);
+  rcvRes = http_keepalive_send_recv(port:port, data:req);
+
+  if("Dienstplan" >!< rcvRes)exit(0);
+  version = eregmatch(pattern:"Dienstplan Version ([0-9.]+)", string: rcvRes);
+  if(isnull(version[1]))exit(0);
+
+  if(version_is_less(version:version[1], test_version:"2.3")) {
+  
+    security_warning(port:port);
+    exit(0);
+
+  }  
+
+}
+
+exit(0);
+


Property changes on: trunk/openvas-plugins/scripts/gb_dienstplan_49412.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Added: trunk/openvas-plugins/scripts/gb_pandora_fms_49261.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_pandora_fms_49261.nasl	2011-09-02 09:43:04 UTC (rev 11548)
+++ trunk/openvas-plugins/scripts/gb_pandora_fms_49261.nasl	2011-09-02 11:13:57 UTC (rev 11549)
@@ -0,0 +1,84 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# Pandora FMS 'index.php' Cross Site Scripting Vulnerability
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(103238);
+ script_bugtraq_id(49261);
+ script_version ("1.0-$Revision$");
+
+ script_name("Pandora FMS 'index.php' Cross Site Scripting Vulnerability");
+
+desc = "Overview:
+Pandora FMS is prone to a cross-site scripting vulnerability because
+it fails to sufficiently sanitize user-supplied data.
+
+An attacker may leverage this issue to execute arbitrary script code
+in the browser of an unsuspecting user in the context of the affected
+site. This may allow the attacker to steal cookie-based authentication
+credentials and launch other attacks.
+
+Pandora FMS 3.2.1 is vulnerable; other versions may also be affected.
+
+Solution:
+Vendor updates are available. Please see the references for more
+information.
+
+References:
+http://www.securityfocus.com/bid/49261
+http://www.pandorafms.org/";
+
+ script_tag(name:"risk_factor", value:"Medium");
+ script_description(desc);
+ script_summary("Determine if Pandora FMS is prone to a cross-site scripting vulnerability");
+ script_category(ACT_ATTACK);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2011 Greenbone Networks GmbH");
+ script_dependencies("gb_pandora_fms_detect.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+include("http_func.inc");
+include("http_keepalive.inc");
+include("version_func.inc");
+   
+port = get_http_port(default:80);
+if(!get_port_state(port))exit(0);
+
+if(!dir = get_dir_from_kb(port:port, app:"pandora_fms"))exit(0);
+url = string(dir, "/pandora_console/index.php?sec=estado&sec2=operation/agentes/estado_agente&refr=60&group_id=12&offset=0&search=bob%22%3E%3Cscript%3Ealert%28%27openvas-xss-test%27%29%3C/script%3E"); 
+
+if(http_vuln_check(port:port, url:url,pattern:"<script>alert\('openvas-xss-test'\)</script>",check_header:TRUE)) {
+     
+  security_warning(port:port);
+  exit(0);
+
+}
+
+exit(0);
+


Property changes on: trunk/openvas-plugins/scripts/gb_pandora_fms_49261.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision



More information about the Openvas-commits mailing list