code | #
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(11812);
script_version ("1.21");
script_cvs_date("Date: 2018/07/10 14:27:33");
script_cve_id("CVE-2003-0148", "CVE-2003-0149", "CVE-2003-0616");
script_bugtraq_id(8316, 8318, 8319);
script_name(english:"ePolicy Orchestrator Multiple Remote Vulnerabilities (OF, FS)");
script_summary(english:"ePolicy Orchestrator vulnerable to several issues");
script_set_attribute(
attribute:"synopsis",
value:"The remote web server has multiple vulnerabilities."
);
script_set_attribute(
attribute:"description",
value:
"According to its banner, the remote version of ePolicy Orchestrator
has multiple vulnerabilities which may allow an attacker to gain
information on the MSDE installation of this host, or even execute
arbitrary code."
);
script_set_attribute(
attribute:"solution",
value:"Upgrade to the latest version of this software."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"plugin_publication_date", value: "2003/07/31");
script_set_attribute(attribute:"vuln_publication_date", value: "2003/07/31");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value:"cpe:/a:mcafee:epolicy_orchestrator");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Web Servers");
script_copyright(english:"This script is Copyright (C) 2003-2018 Tenable Network Security, Inc.");
script_require_ports("Services/www", 8081);
script_dependencie("find_service1.nasl", "httpver.nasl", "http_version.nasl");
exit(0);
}
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
function check(port)
{
local_var banner, req, res;
if ( get_kb_item("Services/www/" + port + "/broken") ) return 0;
banner = get_http_banner(port:port);
if ( ! banner || "Server: Spipe/1.0" >!< banner ) return 0;
res = http_send_recv3(method:"GET", item:"/SERVER.INI", port:port);
if (isnull(res)) exit(0);
if(("DataSource" >< res && "AgentHttpPort" >< res && "MaxHttpConnection" >< res) ||
("Server: Spipe/1.0" >< res && "MIME-version: 1.0" >< res))
{
security_hole(port);
}
return(0);
}
#
# Execution begins here
#
ports = add_port_in_list(list:get_kb_list("Services/www"), port:8081);
foreach port (ports)
{
if ( get_port_state(port) ) check(port:port);
}
|