[Openvas-commits] r11677 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Fri Sep 23 10:55:42 CEST 2011


Author: mime
Date: 2011-09-23 10:55:34 +0200 (Fri, 23 Sep 2011)
New Revision: 11677

Added:
   trunk/openvas-plugins/scripts/gb_EasySiteEdit_49258.nasl
   trunk/openvas-plugins/scripts/gb_bonza_digital_cart_scrip_49262.nasl
   trunk/openvas-plugins/scripts/gb_hotel_portal_49297.nasl
Modified:
   trunk/openvas-plugins/ChangeLog
Log:
Added new plugins

Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2011-09-23 07:50:10 UTC (rev 11676)
+++ trunk/openvas-plugins/ChangeLog	2011-09-23 08:55:34 UTC (rev 11677)
@@ -1,3 +1,10 @@
+2011-09-23  Michael Meyer <michael.meyer at greenbone.net>
+
+	* scripts/gb_bonza_digital_cart_scrip_49262.nasl,
+	scripts/gb_EasySiteEdit_49258.nasl,
+	scripts/gb_hotel_portal_49297.nasl:
+	Added new plugins.
+
 2011-09-22  Michael Meyer <michael.meyer at greenbone.net>
 
 	* scripts/gb_yabsoft_image_hosting_script_49457.nasl,

Added: trunk/openvas-plugins/scripts/gb_EasySiteEdit_49258.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_EasySiteEdit_49258.nasl	2011-09-23 07:50:10 UTC (rev 11676)
+++ trunk/openvas-plugins/scripts/gb_EasySiteEdit_49258.nasl	2011-09-23 08:55:34 UTC (rev 11677)
@@ -0,0 +1,88 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# EasySiteEdit 'sublink.php' Remote File Include Vulnerability
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(103274);
+ script_bugtraq_id(49258);
+ script_version ("1.0-$Revision$");
+
+ script_name("EasySiteEdit 'sublink.php' Remote File Include Vulnerability");
+
+desc = "Overview:
+EasySiteEdit is prone to a remote file-include vulnerability because
+it fails to sufficiently sanitize user-supplied input.
+
+Exploiting this issue may allow an attacker to compromise the
+application and the underlying system; other attacks are also
+possible.
+
+
+References:
+http://www.securityfocus.com/bid/49258
+http://www.easysiteedit.com/";
+
+ script_tag(name:"risk_factor", value:"Medium");
+ script_description(desc);
+ script_summary("Determine if EasySiteEdit is prone to a remote	file-include vulnerability");
+ script_category(ACT_ATTACK);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2011 Greenbone Networks GmbH");
+ script_dependencies("find_service.nes", "http_version.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+include("http_func.inc");
+include("host_details.inc");
+include("http_keepalive.inc");
+   
+port = get_http_port(default:80);
+
+if(!get_port_state(port))exit(0);
+
+if(!can_host_php(port:port))exit(0);
+
+dirs = make_list("/esev2","/esev",cgi_dirs());
+files = traversal_files();
+
+foreach dir (dirs) {
+
+  foreach file (keys(files)) {
+   
+    url = string(dir, "/sublink.php?langval=/",files[file]); 
+
+    if(http_vuln_check(port:port, url:url,pattern:file)) {
+     
+      security_warning(port:port);
+      exit(0);
+
+    }
+  }
+}
+exit(0);
+


Property changes on: trunk/openvas-plugins/scripts/gb_EasySiteEdit_49258.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Added: trunk/openvas-plugins/scripts/gb_bonza_digital_cart_scrip_49262.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_bonza_digital_cart_scrip_49262.nasl	2011-09-23 07:50:10 UTC (rev 11676)
+++ trunk/openvas-plugins/scripts/gb_bonza_digital_cart_scrip_49262.nasl	2011-09-23 08:55:34 UTC (rev 11677)
@@ -0,0 +1,85 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# Bonza Digital Cart Script Cross Site Scripting and SQL Injection Vulnerabilities
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(103273);
+ script_bugtraq_id(49262);
+ script_version ("1.0-$Revision$");
+
+ script_name("Bonza Digital Cart Script Cross Site Scripting and SQL Injection Vulnerabilities");
+
+desc = "Overview:
+Bonza Digital Cart Script is prone to a cross-site scripting
+vulnerability and an SQL-injection vulnerability because the
+application fails to sufficiently sanitize user-supplied input.
+
+Exploiting these issues could allow an attacker to steal cookie-
+based authentication credentials, compromise the application,
+access or modify data, or exploit latent vulnerabilities in the
+underlying database.
+
+References:
+http://www.securityfocus.com/bid/49262
+http://www.turnkeycentral.com/scripts/bonza-digital-cart-script/";
+
+ script_tag(name:"risk_factor", value:"Medium");
+ script_description(desc);
+ script_summary("Determine if Bonza Digital Cart Script is prone to a cross-site scripting vulnerability");
+ script_category(ACT_ATTACK);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2011 Greenbone Networks GmbH");
+ script_dependencies("find_service.nes", "http_version.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+include("http_func.inc");
+include("host_details.inc");
+include("http_keepalive.inc");
+   
+port = get_http_port(default:80);
+
+if(!get_port_state(port))exit(0);
+if(!can_host_php(port:port))exit(0);
+
+dirs = make_list("/shop",cgi_dirs());
+
+foreach dir (dirs) {
+   
+  url = string(dir, '/searchresults.php?SearchTerm="><script>alert(/openvas-xss-test/)</script>&where=ItemName&ord1=ItemName&ord2=asc&search1.x=50&search1.y=14');
+
+  if(http_vuln_check(port:port, url:url,pattern:"<script>alert\(/openvas-xss-test/\)</script></b>")) {
+     
+    security_warning(port:port);
+    exit(0);
+
+  }
+}
+
+exit(0);
+


Property changes on: trunk/openvas-plugins/scripts/gb_bonza_digital_cart_scrip_49262.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Added: trunk/openvas-plugins/scripts/gb_hotel_portal_49297.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_hotel_portal_49297.nasl	2011-09-23 07:50:10 UTC (rev 11676)
+++ trunk/openvas-plugins/scripts/gb_hotel_portal_49297.nasl	2011-09-23 08:55:34 UTC (rev 11677)
@@ -0,0 +1,85 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# Tourismscripts Hotel Portal 'hotel_city' Parameter HTML Injection Vulnerability
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(103275);
+ script_bugtraq_id(49297);
+ script_version ("1.0-$Revision$");
+
+ script_name("Tourismscripts Hotel Portal 'hotel_city' Parameter HTML Injection Vulnerability");
+
+desc = "Overview:
+Hotel Portal is prone to an HTML-injection vulnerability because it
+fails to sufficiently sanitize user-supplied data.
+
+Attacker-supplied HTML and script code would run in the context of the
+affected browser, potentially allowing the attacker to steal cookie-
+based authentication credentials or control how the site is rendered
+to the user. Other attacks are also possible.
+
+References:
+http://www.securityfocus.com/bid/49297
+http://www.tourismscripts.com";
+
+ script_tag(name:"risk_factor", value:"Medium");
+ script_description(desc);
+ script_summary("Determine if Hotel Portal is prone to an HTML-injection vulnerability");
+ script_category(ACT_ATTACK);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2011 Greenbone Networks GmbH");
+ script_dependencies("find_service.nes", "http_version.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+include("http_func.inc");
+include("host_details.inc");
+include("http_keepalive.inc");
+include("global_settings.inc");
+   
+port = get_http_port(default:80);
+
+if(!get_port_state(port))exit(0);
+if(!can_host_php(port:port))exit(0);
+
+dirs = make_list(cgi_dirs());
+
+foreach dir (dirs) {
+   
+  url = string(dir,'/city.php?hotel_city=%22%3E%3Cscript%3Ealert(/openvas-xss-test/)%3C/script%3E'); 
+
+  if(http_vuln_check(port:port, url:url,pattern:"<script>alert\(/openvas-xss-test/\)</script>",check_header:TRUE)) {
+     
+    security_warning(port:port);
+    exit(0);
+
+  }
+}
+
+exit(0);
+


Property changes on: trunk/openvas-plugins/scripts/gb_hotel_portal_49297.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision



More information about the Openvas-commits mailing list