Vulnerabilities > CVE-2002-0290 - Unspecified vulnerability in Netwin Webnews 1.1H/1.1I/1.1J

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
netwin
nessus

Summary

Buffer overflow in Netwin WebNews CGI program 1.1, Webnews.exe, allows remote attackers to execute arbitrary code via a long group argument.

Vulnerable Configurations

Part Description Count
Application
Netwin
3

Nessus

NASL familyCGI abuses
NASL idWEBNEWS.NASL
descriptionThe remote host appears to be running WebNews, which offers web-based access to Usenet news. Some versions of WebNews are prone to a buffer overflow when processing a query string with an overly-long group parameter. An attacker may be able to leverage this issue to execute arbitrary shell code on the remote host subject to the permissions of the web server user id.
last seen2020-06-01
modified2020-06-02
plugin id11732
published2003-06-11
reporterThis script is Copyright (C) 2003-2018 John Lampe
sourcehttps://www.tenable.com/plugins/nessus/11732
titleNetwin WebNews Webnews.exe Remote Overflow
code
#
# This script was written by John [email protected]
#
# See the Nessus Scripts License for details
#

# Changes by Tenable:
# - Revised plugin title (4/13/2009)

include("compat.inc");

if (description)
{
 script_id(11732);
 script_version("1.23");
 script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/12");

 script_cve_id("CVE-2002-0290");
 script_bugtraq_id(4124);

 script_name(english:"Netwin WebNews Webnews.exe Remote Overflow");
 script_summary(english:"Checks for the Webnews.exe file");

 script_set_attribute(attribute:"synopsis", value:
"The remote web server contains a CGI script that suffers from a buffer
overflow vulnerability.");
 script_set_attribute(attribute:"description", value:
"The remote host appears to be running WebNews, which offers web-based
access to Usenet news.

Some versions of WebNews are prone to a buffer overflow when
processing a query string with an overly-long group parameter. An
attacker may be able to leverage this issue to execute arbitrary shell
code on the remote host subject to the permissions of the web server
user id.");
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2002/Feb/250");
 script_set_attribute(attribute:"solution", value:
"Apply the patch made released by the vendor on February 14th, 2002 if
running Webnews 1.1 or older.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"false");

 script_set_attribute(attribute:"vuln_publication_date", value:"2004/04/09");
 script_set_attribute(attribute:"plugin_publication_date", value:"2003/06/11");

 script_set_attribute(attribute:"potential_vulnerability", value:"true");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);

 script_copyright(english:"This script is Copyright (C) 2003-2020 John Lampe");
 script_family(english:"CGI abuses");

 script_dependencie("http_version.nasl", "find_service1.nasl", "no404.nasl");
 script_exclude_keys("Settings/disable_cgi_scanning");
 script_require_keys("Settings/ParanoidReport");
 script_require_ports("Services/www", 80);

 exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("http_func.inc");
include("http_keepalive.inc");

if (report_paranoia < 2) audit(AUDIT_PARANOID);


port = get_http_port(default:80, embedded:TRUE);
if(!get_port_state(port))exit(0);

flag = 0;
directory = "";

foreach dir (cgi_dirs()) {
   if(is_cgi_installed_ka(item:string(dir, "/Webnews.exe"), port:port)) {
  	flag = 1;
  	directory = dir;
  	break;
   }
}

if (flag) security_warning(port);