[Openvas-commits] r11591 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Thu Sep 8 12:04:22 CEST 2011


Author: mime
Date: 2011-09-08 12:04:18 +0200 (Thu, 08 Sep 2011)
New Revision: 11591

Added:
   trunk/openvas-plugins/scripts/gb_hastymail_49492.nasl
   trunk/openvas-plugins/scripts/gb_tomcat_48456.nasl
   trunk/openvas-plugins/scripts/gb_tomcat_49353.nasl
Modified:
   trunk/openvas-plugins/ChangeLog
   trunk/openvas-plugins/scripts/gb_hastymail2_detect.nasl
   trunk/openvas-plugins/scripts/gb_macosx_iwork_9_1_upd.nasl
Log:
Added new plugins. Updated to detect also the RC version. Fixed typo in dependency

Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2011-09-08 07:37:29 UTC (rev 11590)
+++ trunk/openvas-plugins/ChangeLog	2011-09-08 10:04:18 UTC (rev 11591)
@@ -1,3 +1,16 @@
+2011-09-08  Michael Meyer <michael.meyer at greenbone.net>
+
+	* scripts/gb_tomcat_49353.nasl,
+	scripts/gb_tomcat_48456.nasl,
+	scripts/gb_hastymail_49492.nasl:
+	Added new plugins.
+
+	* scripts/gb_hastymail2_detect.nasl:
+	Updated to detect also the RC version.
+
+	* scripts/gb_macosx_iwork_9_1_upd.nasl:
+	Fixed typo in dependency.
+
 2011-09-07 Thomas Reinke <reinke at securityspace.com>
 
 	* scripts/cisco_default_pw.nasl,

Modified: trunk/openvas-plugins/scripts/gb_hastymail2_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hastymail2_detect.nasl	2011-09-08 07:37:29 UTC (rev 11590)
+++ trunk/openvas-plugins/scripts/gb_hastymail2_detect.nasl	2011-09-08 10:04:18 UTC (rev 11591)
@@ -69,7 +69,8 @@
     rcvRes = http_keepalive_send_recv(port:port, data:sndReq);
 
     ## Match the version
-    hm2Ver = eregmatch(pattern:"to (([a-zA-z]+)?([0-9.]+))", string:rcvRes);
+    hm2Ver = eregmatch(pattern:"to (([a-zA-z]+)?([0-9.]+)( (RC[0-9]))?)", string:rcvRes);
+
     if(hm2Ver[1]!= NULL && (hm2Ver[2]!= NULL)){
       vers = hm2Ver[1];
     }
@@ -78,6 +79,8 @@
       vers = hm2Ver[3];
     }
 
+    if("RC" >< hm2Ver[5])vers = vers + ' ' + hm2Ver[5];
+
     if(vers)
     {
       ## Set the version of Hastymail2 in KB

Added: trunk/openvas-plugins/scripts/gb_hastymail_49492.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hastymail_49492.nasl	2011-09-08 07:37:29 UTC (rev 11590)
+++ trunk/openvas-plugins/scripts/gb_hastymail_49492.nasl	2011-09-08 10:04:18 UTC (rev 11591)
@@ -0,0 +1,84 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# Hastymail2 Multiple Cross Site Scripting Vulnerabilities
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(103244);
+ script_bugtraq_id(49492);
+ script_version ("1.0-$Revision$");
+
+ script_name("Hastymail2 Multiple Cross Site Scripting Vulnerabilities");
+
+desc = "Overview:
+Hastymail2 is prone to multiple cross-site scripting vulnerabilities
+because it fails to sufficiently sanitize user-supplied data.
+
+An attacker may leverage these issues to execute arbitrary script code
+in the browser of an unsuspecting user in the context of the affected
+site. This may allow the attacker to steal cookie-based authentication
+credentials and to launch other attacks.
+
+Versions prior to Hastymail2 1.1 RC1 are vulnerable.
+
+Solution:
+Updates are available. Please see the references for more information.
+
+References:
+http://www.securityfocus.com/bid/49492
+http://www.hastymail.org/
+http://hastymail.svn.sourceforge.net/viewvc/hastymail/trunk/hastymail2/CHANGES?revision=1983";
+
+ script_tag(name:"risk_factor", value:"Medium");
+ script_description(desc);
+ script_summary("Determine if installed Hastymail2 version is vulnerable");
+ script_category(ACT_GATHER_INFO);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2011 Greenbone Networks GmbH");
+ script_dependencies("gb_hastymail2_detect.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+include("http_func.inc");
+include("http_keepalive.inc");
+include("version_func.inc");
+
+port = get_http_port(default:80);
+if(!get_port_state(port))exit(0);
+
+if (!can_host_php(port:port)) exit(0);
+
+if(vers = get_version_from_kb(port:port,app:"Hastymail2")) {
+
+  if(version_is_less(version: vers, test_version: "1.1 RC1")) {
+      security_warning(port:port);
+      exit(0);
+  }
+
+}
+
+exit(0);


Property changes on: trunk/openvas-plugins/scripts/gb_hastymail_49492.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Modified: trunk/openvas-plugins/scripts/gb_macosx_iwork_9_1_upd.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_macosx_iwork_9_1_upd.nasl	2011-09-08 07:37:29 UTC (rev 11590)
+++ trunk/openvas-plugins/scripts/gb_macosx_iwork_9_1_upd.nasl	2011-09-08 10:04:18 UTC (rev 11591)
@@ -65,7 +65,7 @@
   script_summary("Checks for Mac OS X iWork 9.1 Update");
   script_category(ACT_GATHER_INFO);
   script_family("Mac OS X Local Security Checks");
-  script_dependencies("secpod_iwork_detect_macosx.nasl");
+  script_dependencies("gb_iwork_detect_macosx.nasl");
   script_require_ports("Apple/iWork/Keynote/MacOSX/Version");
   exit(0);
 }

Added: trunk/openvas-plugins/scripts/gb_tomcat_48456.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_tomcat_48456.nasl	2011-09-08 07:37:29 UTC (rev 11590)
+++ trunk/openvas-plugins/scripts/gb_tomcat_48456.nasl	2011-09-08 10:04:18 UTC (rev 11591)
@@ -0,0 +1,95 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# Apache Tomcat 'MemoryUserDatabase' Information Disclosure Vulnerability
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(103243);
+ script_bugtraq_id(48456);
+ script_cve_id("CVE-2011-2204");
+ script_tag(name:"cvss_base", value:"1.9");
+ script_version ("1.0-$Revision$");
+
+ script_name("Apache Tomcat 'MemoryUserDatabase' Information Disclosure Vulnerability");
+
+desc = "Overview:
+Apache Tomcat is prone to a remote information-disclosure
+vulnerability.
+
+Remote attackers can exploit this issue to obtain sensitive
+information that will aid in further attacks.
+
+The following versions are affected:
+
+Tomcat 5.5.0 through 5.5.33 Tomcat 6.0.0 through 6.0.32 Tomcat 7.0.0
+through 7.0.16
+
+Solution:
+Updates are available. Please see the references for more information.
+
+References:
+http://www.securityfocus.com/bid/48456
+http://tomcat.apache.org/security-5.html
+http://tomcat.apache.org/security-6.html
+http://tomcat.apache.org/security-7.html
+http://tomcat.apache.org/
+http://support.avaya.com/css/P8/documents/100147910
+";
+
+ script_tag(name:"risk_factor", value:"Low");
+ script_description(desc);
+ script_summary("Determine if installed Tomcat version is vuolnerable");
+ script_category(ACT_GATHER_INFO);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2011 Greenbone Networks GmbH");
+ script_dependencies("gb_apache_tomcat_detect.nasl");
+ script_require_ports("Services/www", 8080);
+ exit(0);
+}
+
+
+include("http_func.inc"); 
+include("version_func.inc");
+include("global_settings.inc");
+
+if(report_paranoia < 2) exit(0); # this nvt is pront to FP
+
+port = get_http_port(default:8080);
+if(!get_port_state(port))exit(0);
+
+if(!vers = get_kb_item(string("www/", port, "/ApacheTomcat")))exit(0);
+
+if(!isnull(vers)) {
+
+  if(version_in_range(version:vers, test_version:"7.0",  test_version2:"7.0.16") ||
+     version_in_range(version:vers, test_version:"6.0",  test_version2:"6.0.32") ||
+     version_in_range(version:vers, test_version:"5.5",    test_version2:"5.5.33")) {
+
+      security_warning(port:port);
+      exit(0);
+
+  }
+
+}


Property changes on: trunk/openvas-plugins/scripts/gb_tomcat_48456.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Added: trunk/openvas-plugins/scripts/gb_tomcat_49353.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_tomcat_49353.nasl	2011-09-08 07:37:29 UTC (rev 11590)
+++ trunk/openvas-plugins/scripts/gb_tomcat_49353.nasl	2011-09-08 10:04:18 UTC (rev 11591)
@@ -0,0 +1,90 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# Apache Tomcat AJP Protocol Security Bypass Vulnerability
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(103242);
+ script_bugtraq_id(49353);
+ script_cve_id("CVE-2011-3190");
+ script_tag(name:"cvss_base", value:"7.5");
+
+ script_version ("1.0-$Revision$");
+
+ script_name("Apache Tomcat AJP Protocol Security Bypass Vulnerability");
+
+desc = "Overview:
+Apache Tomcat is prone to a security-bypass vulnerability.
+
+Successful exploits will allow attackers to bypass certain security
+restrictions.
+
+Solution:
+Updates are available. Please see the references for more information.
+
+References:
+http://www.securityfocus.com/bid/49353
+http://tomcat.apache.org/security-5.html
+http://tomcat.apache.org/security-6.html
+http://tomcat.apache.org/security-7.html
+http://tomcat.apache.org/
+";
+
+ script_tag(name:"risk_factor", value:"High");
+ script_description(desc);
+ script_summary("Determine if installed Tomcat version is vulnerable");
+ script_category(ACT_GATHER_INFO);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2011 Greenbone Networks GmbH");
+ script_dependencies("gb_apache_tomcat_detect.nasl");
+ script_require_ports("Services/www", 8080);
+ exit(0);
+}
+
+include("http_func.inc");
+include("host_details.inc");
+include("http_keepalive.inc");
+include("version_func.inc");
+include("global_settings.inc");
+
+if(report_paranoia < 2) exit(0); # this nvt is pront to FP
+
+port = get_http_port(default:8080);
+if(!get_port_state(port))exit(0);
+
+if(!vers = get_kb_item(string("www/", port, "/ApacheTomcat")))exit(0);
+
+if(!isnull(vers)) {
+
+  if(version_in_range(version:vers, test_version:"7.0",  test_version2:"7.0.20") ||
+     version_in_range(version:vers, test_version:"6.0",  test_version2:"6.0.33") ||
+     version_in_range(version:vers, test_version:"5",    test_version2:"5.5.33")) {
+    
+      security_hole(port:port);
+      exit(0);
+
+  }
+
+}


Property changes on: trunk/openvas-plugins/scripts/gb_tomcat_49353.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision



More information about the Openvas-commits mailing list