[Openvas-commits] r11638 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Tue Sep 20 13:31:37 CEST 2011


Author: mime
Date: 2011-09-20 13:31:33 +0200 (Tue, 20 Sep 2011)
New Revision: 11638

Added:
   trunk/openvas-plugins/scripts/gb_wordpress_49688.nasl
   trunk/openvas-plugins/scripts/gb_wordpress_49689.nasl
   trunk/openvas-plugins/scripts/gb_zabbix_49277.nasl
Modified:
   trunk/openvas-plugins/ChangeLog
Log:
Added new plugins

Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2011-09-19 14:10:22 UTC (rev 11637)
+++ trunk/openvas-plugins/ChangeLog	2011-09-20 11:31:33 UTC (rev 11638)
@@ -1,3 +1,10 @@
+2011-09-20  Michael Meyer <michael.meyer at greenbone.net>
+
+	* scripts/gb_wordpress_49688.nasl,
+	scripts/gb_wordpress_49689.nasl,
+	scripts/gb_zabbix_49277.nasl:
+	Added new plugins.
+
 2011-09-19  Michael Meyer <michael.meyer at greenbone.net>
 
 	* scripts/gb_wordpress_49665.nasl,

Added: trunk/openvas-plugins/scripts/gb_wordpress_49688.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_wordpress_49688.nasl	2011-09-19 14:10:22 UTC (rev 11637)
+++ trunk/openvas-plugins/scripts/gb_wordpress_49688.nasl	2011-09-20 11:31:33 UTC (rev 11638)
@@ -0,0 +1,89 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# WordPress TheCartPress Plugin 'tcp_class_path' Parameter Remote File Include Vulnerability
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(103261);
+ script_bugtraq_id(49688);
+ script_version ("1.0-$Revision$");
+
+ script_name("WordPress TheCartPress Plugin 'tcp_class_path' Parameter Remote File Include Vulnerability");
+
+desc = "Overview:
+TheCartPress plug-in for WordPress is prone to a remote file-include
+vulnerability because it fails to sufficiently sanitize user-
+supplied input.
+
+Exploiting this issue could allow an attacker to compromise the
+application and the underlying system; other attacks are also
+possible.
+
+TheCartPress 1.1.1 is vulnerable; other versions may also be affected.
+
+References:
+http://www.securityfocus.com/bid/49688
+http://wordpress.org/extend/plugins/thecartpress/download/
+http://wordpress.org/";
+
+ script_tag(name:"risk_factor", value:"Medium");
+ script_description(desc);
+ script_summary("Determine if installed WordPress is vulnerable");
+ script_category(ACT_ATTACK);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2011 Greenbone Networks GmbH");
+ script_dependencies("secpod_wordpress_detect_900182.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+include("http_func.inc");
+include("host_details.inc");
+include("http_keepalive.inc");
+include("version_func.inc");
+   
+port = get_http_port(default:80);
+if(!get_port_state(port))exit(0);
+
+if(!can_host_php(port:port))exit(0);
+if(!dir = get_dir_from_kb(port:port, app:"WordPress"))exit(0);
+
+files = traversal_files();
+
+foreach file (keys(files)) {
+   
+  url = string(dir, "/wp-content/plugins/thecartpress/checkout/CheckoutEditor.php?tcp_save_fields=true&tcp_class_name=asdf&tcp_class_path=/",files[file]); 
+
+  if(http_vuln_check(port:port, url:url,pattern:file)) {
+     
+    security_warning(port:port);
+    exit(0);
+
+  }
+}
+
+exit(0);
+


Property changes on: trunk/openvas-plugins/scripts/gb_wordpress_49688.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Added: trunk/openvas-plugins/scripts/gb_wordpress_49689.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_wordpress_49689.nasl	2011-09-19 14:10:22 UTC (rev 11637)
+++ trunk/openvas-plugins/scripts/gb_wordpress_49689.nasl	2011-09-20 11:31:33 UTC (rev 11638)
@@ -0,0 +1,89 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# WordPress Annonces Plugin 'abspath' Parameter Remote File Include Vulnerability
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(103262);
+ script_bugtraq_id(49689);
+ script_version ("1.0-$Revision$");
+
+ script_name("WordPress Annonces Plugin 'abspath' Parameter Remote File Include Vulnerability");
+
+desc = "Overview:
+The Annonces plug-in for WordPress is prone to a remote file-include
+vulnerability because it fails to sufficiently sanitize user-
+supplied input.
+
+Exploiting this issue could allow an attacker to compromise the
+application and the underlying system; other attacks are also
+possible.
+
+Annonces 1.2.0.0 is vulnerable; other versions may also be affected.
+
+References:
+http://www.securityfocus.com/bid/49689
+http://wordpress.org/extend/plugins/annonces/
+http://wordpress.org/";
+
+ script_tag(name:"risk_factor", value:"Medium");
+ script_description(desc);
+ script_summary("Determine if installed WordPress is vulnerable");
+ script_category(ACT_ATTACK);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2011 Greenbone Networks GmbH");
+ script_dependencies("secpod_wordpress_detect_900182.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+include("http_func.inc");
+include("host_details.inc");
+include("http_keepalive.inc");
+include("version_func.inc");
+   
+port = get_http_port(default:80);
+if(!get_port_state(port))exit(0);
+
+if(!can_host_php(port:port))exit(0);
+if(!dir = get_dir_from_kb(port:port, app:"WordPress"))exit(0);
+
+files = traversal_files();
+
+foreach file (keys(files)) { 
+
+  url = string(dir, "/wp-content/plugins/annonces/includes/lib/photo/uploadPhoto.php?mainPluginFile=/",files[file],"&abspath=../../../../../../"); 
+
+  if(http_vuln_check(port:port, url:url,pattern:file)) {
+     
+    security_warning(port:port);
+    exit(0);
+
+  }
+}
+
+exit(0);
+


Property changes on: trunk/openvas-plugins/scripts/gb_wordpress_49689.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Added: trunk/openvas-plugins/scripts/gb_zabbix_49277.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_zabbix_49277.nasl	2011-09-19 14:10:22 UTC (rev 11637)
+++ trunk/openvas-plugins/scripts/gb_zabbix_49277.nasl	2011-09-20 11:31:33 UTC (rev 11638)
@@ -0,0 +1,86 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# ZABBIX 'popup.php' Information Disclosure Vulnerability
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(103260);
+ script_bugtraq_id(49277);
+ script_cve_id("CVE-2011-3265");
+ script_tag(name:"cvss_base", value:"5.0");
+ script_version ("1.0-$Revision$");
+
+ script_name("ZABBIX 'popup.php' Information Disclosure Vulnerability");
+
+desc = "Overview:
+ZABBIX is prone to an information-disclosure vulnerability because it
+fails to sufficiently validate user-supplied data.
+
+An attacker can exploit this issue to read the contents of arbitrary
+database tables. This may allow the attacker to obtain sensitive
+information; other attacks are also possible.
+
+Version prior to ZABBIX 1.8.7 are vulnerable.
+
+Solution:
+Updates are available. Please see the reference for more details.
+
+References:
+http://www.securityfocus.com/bid/49277
+https://support.zabbix.com/browse/ZBX-3955
+http://www.zabbix.com/index.php";
+
+ script_tag(name:"risk_factor", value:"Medium");
+ script_description(desc);
+ script_summary("Determine if installed Zabbix version is vulnerable");
+ script_category(ACT_GATHER_INFO);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2011 Greenbone Networks GmbH");
+ script_dependencies("zabbix_detect.nasl","zabbix_web_detect.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+include("http_func.inc");
+include("host_details.inc");
+include("http_keepalive.inc");
+include("version_func.inc");
+
+port = get_http_port(default:80);
+if(!get_port_state(port))exit(0);
+
+if (!can_host_php(port:port)) exit(0);
+
+if(vers = get_version_from_kb(port:port,app:"zabbix_client")) {
+
+  if(version_is_less(version: vers, test_version: "1.8.7")) {
+      security_warning(port:port);
+      exit(0);
+  }
+
+}
+
+exit(0);


Property changes on: trunk/openvas-plugins/scripts/gb_zabbix_49277.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision



More information about the Openvas-commits mailing list