Vulnerabilities > CVE-2000-0012 - Unspecified vulnerability in Hughes Msql 2.0.11

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
hughes
critical
nessus
exploit available

Summary

Buffer overflow in w3-msql CGI program in miniSQL package allows remote attackers to execute commands.

Vulnerable Configurations

Part Description Count
Application
Hughes
1

Exploit-Db

descriptionHughes Technologies Mini SQL (mSQL) 2.0.11 w3-msql Buffer Overflow Vulnerabilities. CVE-2000-0012. Remote exploit for solaris platform
idEDB-ID:19696
last seen2016-02-02
modified1999-10-28
published1999-10-28
reporterZhodiac
sourcehttps://www.exploit-db.com/download/19696/
titleHughes Technologies Mini SQL mSQL 2.0.11 w3-msql Buffer Overflow

Nessus

NASL familyCGI abuses
NASL idW3MSQL_OVERFLOW.NASL
descriptionThe mini-sql program comes with the w3-msql CGI which is vulnerable to a buffer overflow. An attacker may use it to gain a shell on this system.
last seen2020-06-01
modified2020-06-02
plugin id10296
published2000-01-03
reporterThis script is Copyright (C) 2000-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/10296
titleMini SQL CGI content-length Field Remote Overflow
code
#
# (C) Tenable Network Security, Inc.
#

include( 'compat.inc' );

if(description)
{
  script_id(10296);
  script_version ("1.38");
  script_cve_id("CVE-2000-0012");
  script_bugtraq_id(898);

  script_name(english:"Mini SQL CGI content-length Field Remote Overflow");
  script_summary(english:"Overflow in w3-msql");

  script_set_attribute(
    attribute:'synopsis',
    value:'The remote CGI script is vulnerable to a buffer overflow.'
  );

  script_set_attribute(
    attribute:'description',
    value:"The mini-sql program comes with the w3-msql CGI which is vulnerable
to a buffer overflow.

An attacker may use it to gain a shell on this system."
  );

  script_set_attribute(
    attribute:'solution',
    value: "Contact the vendor for a patch or remove the CGI.
A patch was also provided with the original disclosure notice."
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(
    attribute:'see_also',
    value:'https://seclists.org/bugtraq/1999/Dec/328'
  );

 script_set_attribute(attribute:"plugin_publication_date", value: "2000/01/03");
 script_set_attribute(attribute:"vuln_publication_date", value: "1999/12/27");
 script_cvs_date("Date: 2018/11/15 20:50:19");
  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_end_attributes();

  script_category(ACT_DENIAL);
  script_copyright(english:"This script is Copyright (C) 2000-2018 Tenable Network Security, Inc.");
  script_family(english:"CGI abuses");
  script_dependencie("http_version.nasl", "find_service1.nasl", "no404.nasl");
  script_require_ports("Services/www", 80);
  script_exclude_keys("Settings/disable_cgi_scanning");
  exit(0);
}

#
# The script code starts here
#

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");


port = get_http_port(default:80);

if (http_is_dead(port: port)) exit(0);

flag = 0;
cgi = "w3-msql/index.html";

foreach dir (cgi_dirs())
{
 if (is_cgi_installed3(port:port, item:string(dir, "/", cgi)))
 {
  flag = 1;
  directory = dir;
  break;
 }
}

if(!flag)exit(0);


r = http_send_recv3(method:"POST", item: directory + "/w3-msql/index.html",
  port: port, content_type: "multipart/form-data", data: crap(16000));

if (http_is_dead(port: port))
       security_hole(port);