Vulnerabilities > CVE-2000-1161 - Unspecified vulnerability in Adcycle 0.77B

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
adcycle
nessus

Summary

The installation of AdCycle banner management system leaves the build.cgi program in a web-accessible directory, which allows remote attackers to execute the program and view passwords or delete databases.

Vulnerable Configurations

Part Description Count
Application
Adcycle
1

Nessus

NASL familyCGI abuses
NASL idADCYCLE_PASS_DISCLOSURE.NASL
descriptionThe CGI
last seen2020-06-01
modified2020-06-02
plugin id11461
published2003-03-24
reporterThis script is Copyright (C) 2003-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/11461
titleAdcycle build.cgi Remote Password Disclosure
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
 script_id(11461);
 script_version("1.19");
 script_cvs_date("Date: 2018/06/13 18:56:25");

 script_cve_id("CVE-2000-1161");
 script_bugtraq_id(1969);

 script_name(english:"Adcycle build.cgi Remote Password Disclosure");
 script_summary(english:"Checks for the presence of /cgi-bin/build.cgi");

 script_set_attribute(attribute:"synopsis", value:"Databases can be accessed or deleted on this server.");
 script_set_attribute(attribute:"description", value:
"The CGI 'build.cgi' is installed. This CGI has a well known security
flaw that lets an attacker obtain the password of the remote AdCycle
database or delete databases.");
 script_set_attribute(attribute:"solution", value:"Remove it from /cgi-bin.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:F/RL:W/RC:ND");

 script_set_attribute(attribute:"vuln_publication_date", value:"2000/11/20");
 script_set_attribute(attribute:"plugin_publication_date", value:"2003/03/24");

 script_set_attribute(attribute:"potential_vulnerability", value:"true");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2003-2018 Tenable Network Security, Inc.");
 script_family(english:"CGI abuses");

 script_dependencie("find_service1.nasl", "http_version.nasl");
 script_exclude_keys("Settings/disable_cgi_scanning");
 script_require_keys("Settings/ParanoidReport");
 script_require_ports("Services/www", 80);
 exit(0);
}

#
# The script code starts here
#
include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

if (report_paranoia < 2) audit(AUDIT_PARANOID);

port = get_http_port(default:80);

foreach dir (cgi_dirs())
{
 res = is_cgi_installed3(item: strcat(dir, "/build.cgi"), port:port);
 if (isnull(res)) exit(0);
 if (res) { security_warning(port); exit(0); }
}