Vulnerabilities > CVE-2002-1528 - Unspecified vulnerability in Mondosoft Mondosearch 4.4

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
NONE
network
low complexity
mondosoft
nessus

Summary

MsmMask.exe in MondoSearch 4.4 allows remote attackers to obtain the source code of scripts via the mask parameter.

Vulnerable Configurations

Part Description Count
Application
Mondosoft
1

Nessus

NASL familyCGI abuses
NASL idMSMMASK.NASL
descriptionThe msmmask.exe CGI is installed. Some versions allow an attacker to read the source of any file in your web server
last seen2020-06-01
modified2020-06-02
plugin id11163
published2002-11-25
reporterThis script is Copyright (C) 2002-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/11163
titleMondoSearch MsmMask.exe Arbitrary Script Source Disclosure
code
#
# (C) Tenable Network Security, Inc.
#

# Affected: MondoSearch 4.4.5147 and below.
#           MondoSearch 4.4.5156 and above are NOT vulnerable.
#
# References:
#
# Message-ID: <[email protected]>
# From:"thefastkid" <[email protected]>
# To:[email protected]
# Subject: MondoSearch show the source of all files
#


include("compat.inc");

if(description)
{
 script_id(11163);
 script_version ("1.24");
 script_cvs_date("Date: 2018/06/13 18:56:28");

 script_cve_id("CVE-2002-1528");
  
 script_name(english:"MondoSearch MsmMask.exe Arbitrary Script Source Disclosure");
 script_summary(english:"Checks for the presence of /cgi-bin/msmMask.exe");
 
 script_set_attribute(attribute:"synopsis", value:
"The remote web server is hosting a CGI application that is affected
by an information disclosure vulnerability." );
 script_set_attribute(attribute:"description", value:
"The msmmask.exe CGI is installed. Some versions allow an attacker to
read the source of any file in your web server's directories by using 
the 'mask' parameter." );
 script_set_attribute(attribute:"solution", value:
"Upgrade your MondoSearch to version 4.4.5156 or later." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");

 script_set_attribute(attribute:"plugin_publication_date", value: "2002/11/25");
 script_set_attribute(attribute:"vuln_publication_date", value: "2002/10/10");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_end_attributes();
 
 script_category(ACT_ATTACK);
 script_copyright(english:"This script is Copyright (C) 2002-2018 Tenable Network Security, Inc.");
 script_family(english:"CGI abuses");

 script_dependencie("http_version.nasl", "find_service1.nasl", "no404.nasl", "httpver.nasl");
 script_require_ports("Services/www", 80);
 script_exclude_keys("Settings/disable_cgi_scanning");
 script_require_keys("www/ASP");
 exit(0);
}


include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80);

if (! can_host_asp(port:port) ) exit(0);


foreach dir (cgi_dirs())
{
  p = string(dir, "/MsmMask.exe");
  q = string(p, "?mask=/nessus", rand(), ".asp");

  res = http_send_recv3(method:"GET", item:q, port:port);
  if (isnull(res)) exit(1, "The web server on port "+port+" failed to respond.");

  if (egrep(pattern: "Failed to read the maskfile .*nessus.*\.asp",string:res[2], icase: 1))
  {
    security_warning(port);
    exit(0);
  }

# Version at or below 4.4.5147
  if (egrep(pattern: "MondoSearch for Web Sites (([0-3]\.)|(4\.[0-3]\.)|(4\.4\.[0-4])|(4\.4\.50)|(4\.4\.51[0-3])|(4\.4\.514[0-7]))", string:res[2]))
  {
    security_warning(port);
    exit(0);
  }
}