Vulnerabilities > CVE-2002-2307 - Unspecified vulnerability in Pyramid Benhur Software Update 66R3

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
NONE
network
low complexity
pyramid
nessus

Summary

The default configuration of BenHur Firewall release 3 update 066 fix 2 allows remote attackers to access arbitrary services by connecting from source port 20.

Vulnerable Configurations

Part Description Count
Application
Pyramid
1

Nessus

NASL familyFirewalls
NASL idBENHUR_FTP_FIREWALL.NASL
descriptionIt is possible to connect to firewall-protected ports on the remote host by setting the source port to 20. An attacker may use this flaw to access services that should not be accessible to outsiders on this host.
last seen2020-06-01
modified2020-06-02
plugin id11052
published2002-07-22
reporterThis script is Copyright (C) 2002-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/11052
titleBenHur Firewall Source Port 20 ACL Restriction Bypass
code
#
# (C) Tenable Network Security, Inc.
#

# Script audit and contributions from Carmichael Security
#      Erik Anderson <[email protected]> (nb: domain no longer exists)
#      Added BugtraqID
#
# See the Nessus Scripts License for details
#


include("compat.inc");

if(description)
{
 script_id(11052);
 script_version("1.26");
 script_cve_id("CVE-2002-2307");
 script_bugtraq_id(5279);

 script_name(english:"BenHur Firewall Source Port 20 ACL Restriction Bypass");

 script_set_attribute(attribute:"synopsis", value:
"It is possible to bypass the firewall on the remote host." );
 script_set_attribute(attribute:"description", value:
"It is possible to connect to firewall-protected ports on the remote
host by setting the source port to 20. An attacker may use this 
flaw to access services that should not be accessible to outsiders 
on this host." );
 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?e608b229" );
 script_set_attribute(attribute:"solution", value:
"Update to 066 fix 2 or:

Reconfigure your firewall to reject any traffic coming from port 20." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");

 script_set_attribute(attribute:"plugin_publication_date", value: "2002/07/22");
 script_cvs_date("Date: 2018/06/27 18:42:25");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"exploited_by_nessus", value:"true");
  script_end_attributes();


 script_summary(english:"Connects to a few services with sport = 20");
 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2002-2018 Tenable Network Security, Inc.");
 script_family(english:"Firewalls");
 exit(0);
}

include('global_settings.inc');

if(islocalhost() || NASL_LEVEL < 2204 )exit(0);

# nb: port 8888 on a BenHur firewall is the Web administration port
#     and normally will not be accessible.
port = 8888;
if ( get_kb_item("Ports/tcp/"+port) ) exit(0, "Port "+port+" is known to be open. This does not look like a BenHur firewall.");

soc = open_sock_tcp(port);
if ( soc ) 
{
  close(soc);
  exit(0, "Nessus was able to open a socket on port "+port+" using an unprivileged source port.");
}

soc = open_priv_sock_tcp(sport:20, dport:port);
if ( ! soc ) exit(0, "Nessus was not able to open a socket on port "+port+" using a privileged source port.");

send(socket:soc, data:'GET / HTTP/1.0\r\n\r\n');
res = recv_line(socket:soc, length:4096);
close(soc);
if (ereg(pattern:"^HTTP/.*", string:res)) security_warning(port);
else exit(0, "The service listening on port "+port+" is not affected.");