Vulnerabilities > CVE-2001-0043 - Unspecified vulnerability in PHPgroupware 0.9.6

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

phpGroupWare before 0.9.7 allows remote attackers to execute arbitrary PHP commands by specifying a malicious include file in the phpgw_info parameter of the phpgw.inc.php program.

Vulnerable Configurations

Part Description Count
Application
Phpgroupware
1

Nessus

NASL familyCGI abuses
NASL idPHPGROUPWARE_REMOTE_CMD.NASL
descriptionThe version of PhpGroupWare hosted on the remote web server has a vulnerability that may permit remote attackers to execute arbitrary commands through the
last seen2020-06-01
modified2020-06-02
plugin id15711
published2004-11-13
reporterThis script is Copyright (C) 2004-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/15711
titlephpGroupWare phpgw.inc.php phpgw_info Parameter Remote File Inclusion
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
 script_id(15711);
 script_version("1.18");
 script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/12");

 script_cve_id("CVE-2001-0043");
 script_bugtraq_id(2069);
	
 script_name(english:"phpGroupWare phpgw.inc.php phpgw_info Parameter Remote File Inclusion");
 script_summary(english:"Checks for PhpGroupWare version");

 script_set_attribute(attribute:"synopsis", value:
"Arbitrary commands may be run on the remote host." );
 script_set_attribute(attribute:"description", value:
"The version of PhpGroupWare hosted on the remote web server has a
vulnerability that may permit remote attackers to execute arbitrary
commands through the 'phpgw_info' parameter of the 'phpgw.inc.php'
script, resulting in a loss of integrity." );
 script_set_attribute(attribute:"solution", value:
"Update to phpGroupWare version 0.9.7 or later." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"false");
 script_set_attribute(attribute:"see_also", value:"https://www.phpgroupware.org/" );

 script_set_attribute(attribute:"plugin_publication_date", value: "2004/11/13");
 script_set_attribute(attribute:"vuln_publication_date", value: "2000/12/06");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_set_attribute(attribute:"cpe",value:"cpe:/a:phpgroupware:phpgroupware");
 script_end_attributes();
 
 script_category(ACT_ATTACK);
 
 script_copyright(english:"This script is Copyright (C) 2004-2020 Tenable Network Security, Inc.");
 script_family(english:"CGI abuses");
 script_dependencie("phpgroupware_detect.nasl");
 script_require_ports("Services/www", 80);
 exit(0);
}

#
# The script code starts here
#

include("http_func.inc");

port = get_http_port(default:80, embedded:TRUE);

kb = get_kb_item("www/" + port + "/phpGroupWare");
if ( ! kb ) exit(0);

matches = eregmatch(pattern:"(.*) under (.*)", string:kb);

if ( ereg(pattern:"^0\.([0-8]\.|9\.[0-6][^0-9])", string:matches[1]) ) 
	security_hole(port);