[Openvas-commits] r11597 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Mon Sep 12 14:00:15 CEST 2011


Author: mime
Date: 2011-09-12 14:00:02 +0200 (Mon, 12 Sep 2011)
New Revision: 11597

Added:
   trunk/openvas-plugins/scripts/gb_cyrus_49534.nasl
   trunk/openvas-plugins/scripts/gb_real_estate_49540.nasl
   trunk/openvas-plugins/scripts/gb_zikula_49491.nasl
Modified:
   trunk/openvas-plugins/ChangeLog
   trunk/openvas-plugins/scripts/gb_icmp_timestamps.nasl
   trunk/openvas-plugins/scripts/secpod_cyrus_imap_server_detect.nasl
Log:
Added new plugins. hanged risk to Low. Store port in KB.

Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2011-09-12 09:09:23 UTC (rev 11596)
+++ trunk/openvas-plugins/ChangeLog	2011-09-12 12:00:02 UTC (rev 11597)
@@ -1,3 +1,16 @@
+2011-09-12  Michael Meyer <michael.meyer at greenbone.net>
+
+	* scripts/gb_zikula_49491.nasl,
+	scripts/gb_cyrus_49534.nasl,
+	scripts/gb_real_estate_49540.nasl:
+	Added new plugins.
+
+	* scripts/gb_icmp_timestamps.nasl:
+	Changed risk to Low. 
+
+	* scripts/secpod_cyrus_imap_server_detect.nasl:
+	Store port in KB.
+
 2011-09-10  Michael Meyer <michael.meyer at greenbone.net>
 
 	* scripts/gb_fedora_2008_8764_dbus_fc9.nasl,

Added: trunk/openvas-plugins/scripts/gb_cyrus_49534.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_cyrus_49534.nasl	2011-09-12 09:09:23 UTC (rev 11596)
+++ trunk/openvas-plugins/scripts/gb_cyrus_49534.nasl	2011-09-12 12:00:02 UTC (rev 11597)
@@ -0,0 +1,94 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# Cyrus IMAP Server 'split_wildmats()' Remote Buffer Overflow Vulnerability
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(103249);
+ script_bugtraq_id(49534);
+ script_version ("1.0-$Revision$");
+
+ script_name("Cyrus IMAP Server 'split_wildmats()' Remote Buffer Overflow Vulnerability");
+
+desc = "Overview:
+Cyrus IMAP Server is prone to a remote buffer-overflow
+vulnerability because the application fails to properly bounds
+check user-supplied data before copying it into an
+insufficiently sized buffer.
+
+Attackers can execute arbitrary code in the context of the affected
+application. Failed exploit attempts will result in a denial-of-
+service condition.
+
+Cyrus IMAP Server versions prior to 2.3.17 and 2.4.11 are vulnerable.
+
+Solution:
+Updates are available. Please see the references for more information.
+
+References:
+http://www.securityfocus.com/bid/49534
+http://asg.andrew.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=199
+http://asg.andrew.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=200
+http://cyrusimap.web.cmu.edu/";
+
+ script_tag(name:"risk_factor", value:"Medium");
+ script_description(desc);
+ script_summary("Determine if installed Cyrus version is vulnerable");
+ script_category(ACT_GATHER_INFO);
+ script_family("Buffer overflow");
+ script_copyright("This script is Copyright (C) 2011 Greenbone Networks GmbH");
+ script_dependencies("secpod_cyrus_imap_server_detect.nasl");
+ script_require_ports("Services/imap", 143);
+ exit(0);
+}
+
+include("version_func.inc");
+include("global_settings.inc");
+
+if(report_paranoia < 2) exit(0); # this nvt is pront to FP
+
+port = get_kb_item("Cyrus/IMAP4/Server/port");
+if(!port || ! get_port_state(port))exit(0);
+
+imapVer = get_kb_item("Cyrus/IMAP4/Server/Ver");
+if(!imapVer){
+    exit(0);
+}
+
+if(version_in_range(version:imapVer, test_version:"2.4", test_version2:"2.4.10") ||
+   version_in_range(version:imapVer, test_version:"2.3", test_version2:"2.3.16")) {
+
+    security_warning(port:port);
+    exit(0);
+
+}  
+
+exit(0);
+
+
+
+
+
+


Property changes on: trunk/openvas-plugins/scripts/gb_cyrus_49534.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Modified: trunk/openvas-plugins/scripts/gb_icmp_timestamps.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_icmp_timestamps.nasl	2011-09-12 09:09:23 UTC (rev 11596)
+++ trunk/openvas-plugins/scripts/gb_icmp_timestamps.nasl	2011-09-12 12:00:02 UTC (rev 11597)
@@ -27,7 +27,7 @@
 if (description)
 {
  
- script_tag(name:"risk_factor", value:"Medium");
+ script_tag(name:"risk_factor", value:"Low");
  script_id(103190);
  script_cve_id("CVE-1999-0524");
  script_version ("1.0-$Revision$");

Added: trunk/openvas-plugins/scripts/gb_real_estate_49540.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_real_estate_49540.nasl	2011-09-12 09:09:23 UTC (rev 11596)
+++ trunk/openvas-plugins/scripts/gb_real_estate_49540.nasl	2011-09-12 12:00:02 UTC (rev 11597)
@@ -0,0 +1,85 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# MYRE Real Estate Software 'findagent.php' Cross Site Scripting and SQL Injection Vulnerabilities
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(103250);
+ script_bugtraq_id(49540);
+ script_version ("1.0-$Revision$");
+
+ script_name("MYRE Real Estate Software 'findagent.php' Cross Site Scripting and SQL Injection Vulnerabilities");
+
+desc = "Overview:
+MYRE Real Estate Software is prone to an SQL-injection and multiple
+cross-site scripting vulnerabilities.
+
+Exploiting these issues could allow an attacker to steal cookie-
+based authentication credentials, compromise the application,
+access or modify data, or exploit latent vulnerabilities in the
+underlying database.
+
+References:
+http://www.securityfocus.com/bid/49540
+http://myrephp.com/
+http://secpod.org/advisories/SECPOD_MRS_SQL_XSS_Vuln.txt";
+
+ script_tag(name:"risk_factor", value:"Medium");
+ script_description(desc);
+ script_summary("Determine if MYRE Real Estate Software is prone to a cross-site scripting vulnerability");
+ script_category(ACT_ATTACK);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2011 Greenbone Networks GmbH");
+ script_dependencies("find_service.nes", "http_version.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+include("http_func.inc");
+include("host_details.inc");
+include("http_keepalive.inc");
+   
+port = get_http_port(default:80);
+if(!get_port_state(port))exit(0);
+
+if(!can_host_php(port:port))exit(0);
+
+dirs = make_list("/realestate",cgi_dirs());
+
+foreach dir (dirs) {
+   
+  url = string(dir, "/findagent.php?country1=%3Cscript%3Ealert(/openvas-xss-test/)%3C/script%3E"); 
+
+  if(http_vuln_check(port:port,url:url,pattern:"<script>alert\(/openvas-xss-test/\)</script>",extra_check:"MYRE Real Estate Software")) {
+     
+    security_warning(port:port);
+    exit(0);
+
+  }
+}
+
+exit(0);
+


Property changes on: trunk/openvas-plugins/scripts/gb_real_estate_49540.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Added: trunk/openvas-plugins/scripts/gb_zikula_49491.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_zikula_49491.nasl	2011-09-12 09:09:23 UTC (rev 11596)
+++ trunk/openvas-plugins/scripts/gb_zikula_49491.nasl	2011-09-12 12:00:02 UTC (rev 11597)
@@ -0,0 +1,87 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# Zikula Application Framework 'themename' Parameter Cross Site Scripting Vulnerability
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(103251);
+ script_bugtraq_id(49491);
+ script_version ("1.0-$Revision$");
+
+ script_name("Zikula Application Framework 'themename' Parameter Cross Site Scripting Vulnerability");
+
+desc = "Overview:
+Zikula Application Framework is prone to a cross-site scripting
+vulnerability because it fails to sufficiently sanitize user-
+supplied data.
+
+An attacker may leverage this issue to execute arbitrary script code
+in the browser of an unsuspecting user in the context of the affected
+site. This may allow the attacker to steal cookie-based authentication
+credentials and to launch other attacks.
+
+Zikula Application Framework 1.3.0 is vulnerable; other versions may
+also be affected.
+
+Solution:
+Updates are available. Please see the references for more information.
+
+References:
+http://www.securityfocus.com/bid/49491
+http://zikula.org/
+https://www.htbridge.ch/advisory/xss_in_zikula.html";
+
+ script_tag(name:"risk_factor", value:"Medium");
+ script_description(desc);
+ script_summary("Determine if installed Zikula version is vulnerable");
+ script_category(ACT_GATHER_INFO);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2011 Greenbone Networks GmbH");
+ script_dependencies("secpod_zikula_detect.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+include("http_func.inc");
+include("host_details.inc");
+include("http_keepalive.inc");
+include("version_func.inc");
+
+port = get_http_port(default:80);
+if(!get_port_state(port))exit(0);
+
+if (!can_host_php(port:port)) exit(0);
+
+if(vers = get_version_from_kb(port:port,app:"zikula")) {
+
+  if(version_is_equal(version: vers, test_version: "1.3.0")) {
+      security_warning(port:port);
+      exit(0);
+  }
+
+}
+
+exit(0);


Property changes on: trunk/openvas-plugins/scripts/gb_zikula_49491.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Modified: trunk/openvas-plugins/scripts/secpod_cyrus_imap_server_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/secpod_cyrus_imap_server_detect.nasl	2011-09-12 09:09:23 UTC (rev 11596)
+++ trunk/openvas-plugins/scripts/secpod_cyrus_imap_server_detect.nasl	2011-09-12 12:00:02 UTC (rev 11597)
@@ -74,6 +74,7 @@
   if(!isnull(imapVer[1]))
   {
     set_kb_item(name:"Cyrus/IMAP4/Server/Ver", value:imapVer[1]);
+    set_kb_item(name:"Cyrus/IMAP4/Server/port", value:port);
     security_note(data:"Cyrus IMAP4 server " + imapVer[1] +
                   " was detected on the host", port:port);
   }



More information about the Openvas-commits mailing list