[Openvas-commits] r11713 - in trunk/openvas-plugins: . scripts

scm-commit@wald.intevation.org scm-commit at wald.intevation.org
Thu Sep 29 13:17:13 CEST 2011


Author: mime
Date: 2011-09-29 13:17:07 +0200 (Thu, 29 Sep 2011)
New Revision: 11713

Added:
   trunk/openvas-plugins/scripts/gb_digital_college_49830.nasl
   trunk/openvas-plugins/scripts/gb_my_news_49818.nasl
Modified:
   trunk/openvas-plugins/ChangeLog
   trunk/openvas-plugins/scripts/www_too_long_options.nasl
Log:
Added new plugins. Fixed a FP

Modified: trunk/openvas-plugins/ChangeLog
===================================================================
--- trunk/openvas-plugins/ChangeLog	2011-09-29 07:01:09 UTC (rev 11712)
+++ trunk/openvas-plugins/ChangeLog	2011-09-29 11:17:07 UTC (rev 11713)
@@ -1,3 +1,12 @@
+2011-09-29  Michael Meyer <michael.meyer at greenbone.net>
+
+	* scripts/gb_my_news_49818.nasl,
+	scripts/gb_digital_college_49830.nasl:
+	Added new plugins.
+
+	* scripts/www_too_long_options.nasl:
+	Fixed a FP.
+
 2011-09-28  Michael Meyer <michael.meyer at greenbone.net>
 
 	* scripts/gb_ibm_websphere_48890.nasl,

Added: trunk/openvas-plugins/scripts/gb_digital_college_49830.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_digital_college_49830.nasl	2011-09-29 07:01:09 UTC (rev 11712)
+++ trunk/openvas-plugins/scripts/gb_digital_college_49830.nasl	2011-09-29 11:17:07 UTC (rev 11713)
@@ -0,0 +1,94 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# Digital College 'basepath' Parameter Multiple Remote File Include Vulnerabilities
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(103280);
+ script_bugtraq_id(49830);
+ script_version ("1.0-$Revision$");
+
+ script_name("Digital College 'basepath' Parameter Multiple Remote File Include Vulnerabilities");
+
+desc = "Overview:
+Digital College is prone to multiple remote file-include
+vulnerabilities because the application fails to sufficiently sanitize
+user-supplied input.
+
+Exploiting these issues may allow a remote attacker to obtain
+sensitive information or to execute arbitrary script code in the
+context of the Web server process. This may allow the attacker to
+compromise the application and the underlying computer; other attacks
+are also possible.
+
+Digital College 1.1 is vulnerable; other versions may also be
+affected.
+
+References:
+http://www.securityfocus.com/bid/49830
+http://digitalcollege.magtrb.com/
+http://packetstormsecurity.org/files/view/105353/digitalcollege-rfi.txt";
+
+ script_tag(name:"risk_factor", value:"Medium");
+ script_description(desc);
+ script_summary("Determine if installed Digital College is vulnerable");
+ script_category(ACT_ATTACK);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2011 Greenbone Networks GmbH");
+ script_dependencies("find_service.nes", "http_version.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+include("http_func.inc");
+include("host_details.inc");
+include("http_keepalive.inc");
+include("global_settings.inc");
+   
+port = get_http_port(default:80);
+if(!get_port_state(port))exit(0);
+
+if(!can_host_php(port:port))exit(0);
+
+dirs = make_list("/dc","/college",cgi_dirs());
+files = traversal_files();
+
+foreach dir (dirs) {
+  foreach file (keys(files)) {
+   
+    url = string(dir, "/includes/tiny_mce/plugins/imagemanager/config.php?basepath=/",files[file],"%00"); 
+
+    if(http_vuln_check(port:port, url:url,pattern:file)) {
+     
+      security_warning(port:port);
+      exit(0);
+
+    }
+  }
+}
+
+exit(0);
+


Property changes on: trunk/openvas-plugins/scripts/gb_digital_college_49830.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Added: trunk/openvas-plugins/scripts/gb_my_news_49818.nasl
===================================================================
--- trunk/openvas-plugins/scripts/gb_my_news_49818.nasl	2011-09-29 07:01:09 UTC (rev 11712)
+++ trunk/openvas-plugins/scripts/gb_my_news_49818.nasl	2011-09-29 11:17:07 UTC (rev 11713)
@@ -0,0 +1,94 @@
+###############################################################################
+# OpenVAS Vulnerability Test
+# $Id$
+#
+# MyNews 1.2 'basepath' Parameter Multiple Remote File Include Vulnerabilities
+#
+# Authors:
+# Michael Meyer <michael.meyer at greenbone.net>
+#
+# Copyright:
+# Copyright (c) 2011 Greenbone Networks GmbH
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2
+# (or any later version), as published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+###############################################################################
+
+if (description)
+{
+ script_id(103281);
+ script_bugtraq_id(49818);
+ script_version ("1.0-$Revision$");
+
+ script_name("MyNews 1.2 'basepath' Parameter Multiple Remote File Include Vulnerabilities");
+
+desc = "Overview:
+MyNews 1.2 is prone to multiple remote file-include vulnerabilities
+because the application fails to sufficiently sanitize user-
+supplied input.
+
+Exploiting these issues may allow a remote attacker to obtain
+sensitive information or to execute arbitrary script code in the
+context of the Web server process. This may allow the attacker to
+compromise the application and the underlying computer; other attacks
+are also possible.
+
+MyNews 1.2 is vulnerable; other versions may also be affected.
+
+References:
+http://www.securityfocus.com/bid/49818
+http://mynews.magtrb.com/
+http://packetstormsecurity.org/files/view/105352/mynews12-rfi.txt";
+
+ script_tag(name:"risk_factor", value:"Medium");
+ script_description(desc);
+ script_summary("Determine if installed MyNews is vulnerable");
+ script_category(ACT_ATTACK);
+ script_family("Web application abuses");
+ script_copyright("This script is Copyright (C) 2011 Greenbone Networks GmbH");
+ script_dependencies("find_service.nes", "http_version.nasl");
+ script_require_ports("Services/www", 80);
+ script_exclude_keys("Settings/disable_cgi_scanning");
+ exit(0);
+}
+
+include("http_func.inc");
+include("host_details.inc");
+include("http_keepalive.inc");
+include("global_settings.inc");
+   
+port = get_http_port(default:80);
+
+if(!get_port_state(port))exit(0);
+
+if(!can_host_php(port:port))exit(0);
+
+dirs = make_list("/mynews","/news",cgi_dirs());
+files = traversal_files();
+
+foreach dir (dirs) {
+
+  foreach file (keys(files)) {
+   
+    url = string(dir, "/includes/tiny_mce/plugins/filemanager/classes/FileManager/FileSystems/ZipFileImpl.php?basepath=/",files[file],"%00"); 
+
+    if(http_vuln_check(port:port, url:url,pattern:file)) {
+     
+      security_warning(port:port);
+      exit(0);
+
+    }
+  }
+}
+exit(0);
+


Property changes on: trunk/openvas-plugins/scripts/gb_my_news_49818.nasl
___________________________________________________________________
Name: svn:keywords
   + Id Revision

Modified: trunk/openvas-plugins/scripts/www_too_long_options.nasl
===================================================================
--- trunk/openvas-plugins/scripts/www_too_long_options.nasl	2011-09-29 07:01:09 UTC (rev 11712)
+++ trunk/openvas-plugins/scripts/www_too_long_options.nasl	2011-09-29 11:17:07 UTC (rev 11713)
@@ -90,11 +90,14 @@
 # We need a simple http_request function. However, for NASL1, let's do this:
 req = http_get(port: port, item: string("/", crap(5001), ".html"));
 req = ereg_replace(string: req, pattern:"^GET", replace: "OPTIONS");
+display(req);
 send(socket:soc, data:req);
 http_recv(socket: soc);
 http_close_socket(soc);
 
-if(http_is_dead(port: port))
+sleep(5);
+
+if(http_is_dead(port: port, retry:4))
 {
   security_hole(port);
   # set_kb_item(name:"www/too_long_url_crash", value:TRUE);



More information about the Openvas-commits mailing list