Vulnerabilities > CVE-2000-0622 - Unspecified vulnerability in Oreilly Website Professional 2.3.18/2.4/2.4.9

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
oreilly
critical
nessus
exploit available

Summary

Buffer overflow in Webfind CGI program in O'Reilly WebSite Professional web server 2.x allows remote attackers to execute arbitrary commands via a URL containing a long "keywords" parameter.

Exploit-Db

descriptionOReilly Software WebSite Professional 2.3.18/2.4/2.4.9 'webfind.exe' Buffer Overflow. CVE-2000-0622. Remote exploit for windows platform
idEDB-ID:20086
last seen2016-02-02
modified2000-06-01
published2000-06-01
reporterRobert Horton
sourcehttps://www.exploit-db.com/download/20086/
titleOReilly Software WebSite Professional 2.3.18/2.4/2.4.9 - 'webfind.exe' Buffer Overflow

Nessus

NASL familyCGI abuses
NASL idWEBFIND.NASL
descriptionThe
last seen2020-06-01
modified2020-06-02
plugin id10475
published2000-07-22
reporterThis script is Copyright (C) 2000-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/10475
titleWebSite Pro webfind.exe keywords Parameter Remote Overflow
code
#
# (C) Tenable Network Security, Inc.
#
#

include("compat.inc");

if (description)
{
 script_id(10475);
 script_version("1.33");
 script_cvs_date("Date: 2018/11/15 20:50:19");

 script_cve_id("CVE-2000-0622");
 script_bugtraq_id(1487);

 script_name(english:"WebSite Pro webfind.exe keywords Parameter Remote Overflow");
 script_summary(english:"Buffer overflow attempt");

 script_set_attribute(attribute:"synopsis", value:
"The remote web server contains a CGI script that is affected by a
buffer overflow flaw.");
 script_set_attribute(attribute:"description", value:
"The 'webfind.exe' CGI script on the remote host is vulnerable to a
buffer overflow when given a too long 'keywords' argument. This
problem allows an attacker to execute arbitrary code as root on this
host.");
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2000/Jul/268");
 script_set_attribute(attribute:"solution", value:"Upgrade to WebSite Professional 2.5 or delete this CGI.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"false");

 script_set_attribute(attribute:"vuln_publication_date", value:"2000/07/19");
 script_set_attribute(attribute:"plugin_publication_date", value:"2000/07/22");

 script_set_attribute(attribute:"potential_vulnerability", value:"true");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_end_attributes();

 # This test is harmless
 script_category(ACT_ATTACK);

 script_copyright(english:"This script is Copyright (C) 2000-2018 Tenable Network Security, Inc.");
 script_family(english:"CGI abuses");

 script_dependencie("http_version.nasl");
 script_exclude_keys("Settings/disable_cgi_scanning");
 script_require_keys("www/websitepro", "Settings/ParanoidReport");
 script_require_ports("Services/www", 80);

 exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

if (report_paranoia < 2) audit(AUDIT_PARANOID);


port = get_http_port(default:80);

foreach dir (cgi_dirs())
{
req = string(dir, "/webfind.exe?keywords=", crap(10));
w = http_send_recv3(method:"GET", item:req, port:port);
if (isnull(w)) exit(0);
if (ereg(pattern:"^HTTP/[0-9]\.[0-9] 500 ", string:w[0]))
{
 # No keep alive here
 req = string(dir, "/webfind.exe?keywords=", crap(2000));
 rq = http_mk_get_req(item:req, port:port);
 req = http_mk_buffer_from_req(req: rq);

 soc = http_open_socket(port);
 if(!soc)exit(0);
 send(socket:soc, data:req);
 r = recv_line(socket: soc, length: 64);
 http_close_socket(soc);
 if(!r)security_hole(port);
 }
}