Vulnerabilities > CVE-1999-0068 - Unspecified vulnerability in PHP 1.0/2.0/2.0B10

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
php
nessus
exploit available

Summary

CGI PHP mylog script allows an attacker to read any file on the target server.

Vulnerable Configurations

Part Description Count
Application
Php
3

Exploit-Db

descriptionPHP/FI 1.0/FI 2.0/FI 2.0 b10 mylog/mlog Vulnerability. CVE-1999-0068. Remote exploit for php platform
idEDB-ID:19553
last seen2016-02-02
modified1997-10-19
published1997-10-19
reporterBryan Berg
sourcehttps://www.exploit-db.com/download/19553/
titlePHP/FI 1.0/FI 2.0/FI 2.0 b10 mylog/mlog Vulnerability

Nessus

NASL familyCGI abuses
NASL idPHP_ARBITRARY_FILE_ACCESS.NASL
descriptionThe remote host is running PHP/FI. The remote version of this software contains a flaw in the files mylog.html/mlog.html that can allow a remote attacker to view arbitrary files on the remote host.
last seen2020-06-01
modified2020-06-02
plugin id15708
published2004-11-13
reporterThis script is Copyright (C) 2004-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/15708
titlePHP < 3.0 mylog.html/mlog.html Arbitrary File Access
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
 script_id(15708);
 script_version("1.13");

 script_cve_id("CVE-1999-0068", "CVE-1999-0346");
 script_bugtraq_id(713);
 
 script_name(english:"PHP < 3.0 mylog.html/mlog.html Arbitrary File Access");

 script_set_attribute(attribute:"synopsis", value:
"Arbitrary files may be read on the remote host." );
 script_set_attribute(attribute:"description", value:
"The remote host is running PHP/FI.

The remote version of this software contains a flaw in 
the files mylog.html/mlog.html that can allow a remote attacker 
to view arbitrary files on the remote host." );
 script_set_attribute(attribute:"solution", value:
"Upgrade to version 3.0 or newer." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"false");

 script_set_attribute(attribute:"plugin_publication_date", value: "2004/11/13");
 script_set_attribute(attribute:"vuln_publication_date", value: "1997/10/19");
 script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/12");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe",value:"cpe:/a:php:php");
script_end_attributes();

 
 summary["english"] = "Checks PHP mylog.html/mlog.html arbitrary file access";

 script_summary(english:summary["english"]);
 
 script_category(ACT_GATHER_INFO);
 
 script_copyright(english:"This script is Copyright (C) 2004-2020 Tenable Network Security, Inc.");
 script_family(english:"CGI abuses");
 
 script_dependencies("http_version.nasl");
 script_require_ports("Services/www", 80);
 script_exclude_keys("Settings/disable_cgi_scanning");
 exit(0);
}

include("http_func.inc");
include("http_keepalive.inc");

port = get_http_port(default:80, embedded:TRUE);
if ( ! port ) exit(0);

foreach dir ( make_list(cgi_dirs(), "/php") )
{
	foreach htmlfile (make_list("/mylog.html", "/mlog.html"))
	{
	  req = http_get(port:port, item:dir + htmlfile + "?screen=/etc/passwd");
 	  res = http_keepalive_send_recv(port:port, data:req);
 	  if ( res == NULL ) 
		exit(0);
 	  if ( egrep( pattern:"root:.*:0:[01]:.*", string:res) )
	  {
	 	security_warning(port);
	 	exit(0);
	  }
	 }
}