Vulnerabilities > CVE-2003-0307 - Unspecified vulnerability in Poster Version.Two

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
poster
nessus

Summary

Poster version.two allows remote authenticated users to gain administrative privileges by appending the "|" field separator and an "admin" value into the email address field.

Vulnerable Configurations

Part Description Count
Application
Poster
1

Nessus

NASL familyCGI abuses
NASL idPOSTER_VERSION_TWO.NASL
descriptionThe remote host is running
last seen2020-06-01
modified2020-06-02
plugin id11629
published2003-05-14
reporterThis script is Copyright (C) 2003-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/11629
titlePoster version.two index.php Account Manipulation Privilege Escalation
code
#
# (C) Tenable Network Security, Inc.
#

# Ref:
#  From: "Peter Winter-Smith" <[email protected]>
#  To: [email protected]
#  Date: Wed, 14 May 2003 11:19:04 +0000
#  Subject: [VulnWatch] Vulnerability in ' poster version.two'



include("compat.inc");

if (description)
{
 script_id(11629);
 script_version ("1.16");
 script_cvs_date("Date: 2018/08/13 14:32:36");
 script_cve_id("CVE-2003-0307");

 script_name(english:"Poster version.two index.php Account Manipulation Privilege Escalation");

 script_set_attribute(attribute:"synopsis", value:
"A remote web application can be reconfigured." );
 script_set_attribute(attribute:"description", value:
"The remote host is running 'poster version.two' a news posting
system written in PHP.

There is a flaw in this version that allows new users to enter a 
specially crafted name that could allow them to gain administrative
privileges on this installation." );
 script_set_attribute(attribute:"solution", value:
"None at this time - disable this CGI." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N");

 script_set_attribute(attribute:"plugin_publication_date", value: "2003/05/14");
 script_set_attribute(attribute:"vuln_publication_date", value: "2003/05/14");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();

 script_summary(english:"Checks if Poster version.two is installed");
 script_category(ACT_GATHER_INFO);
 script_family(english:"CGI abuses");
 script_copyright(english:"This script is Copyright (C) 2003-2018 Tenable Network Security, Inc.");
 script_dependencie("webmirror.nasl", "http_version.nasl");
 script_require_ports("Services/www", 80);
 script_exclude_keys("Settings/disable_cgi_scanning");
 script_require_keys("www/PHP");
 exit(0);
}

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");



port = get_http_port(default:80, embedded: 0);
if(!can_host_php(port:port))exit(0);

dir = list_uniq(make_list("/poster", cgi_dirs()));
		
foreach d (dir)
{
 r = http_send_recv3(method: "GET", item:d + "/index.php", port:port);
 if (isnull(r)) exit(0);
 res= r[0]+r[1]+'\r\n'+r[2];
 if("<title>poster version.two</title>" >< res &&
    "?go=check" >< res &&
    "poster version.two: login" >< res){
    	security_warning(port);
	exit(0);
	}
}