Vulnerabilities > CVE-2003-1181 - Unspecified vulnerability in Advanced Poll Advanced Poll 2.0.2

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
advanced-poll
nessus
exploit available

Summary

Advanced Poll 2.0.2 allows remote attackers to obtain sensitive information via an HTTP request to info.php, which invokes the phpinfo() function.

Vulnerable Configurations

Part Description Count
Application
Advanced_Poll
1

Exploit-Db

descriptionAdvanced Poll 2.0 Remote Information Disclosure Vulnerability. CVE-2003-1181. Webapps exploit for php platform
idEDB-ID:22412
last seen2016-02-02
modified2003-03-22
published2003-03-22
reportersubj
sourcehttps://www.exploit-db.com/download/22412/
titleAdvanced Poll 2.0 - Remote Information Disclosure Vulnerability

Nessus

NASL familyCGI abuses
NASL idADVANCED_POLL_PHPINFO.NASL
descriptionThe remote host is running Chien Kien Uong
last seen2020-06-01
modified2020-06-02
plugin id11487
published2003-03-27
reporterThis script is Copyright (C) 2003-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/11487
titleAdvanced Poll info.php Remote Information Disclosure
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if(description)
{
 script_id(11487);
 script_version ("1.22");

 script_cve_id("CVE-2003-1181");
 script_bugtraq_id(7171);
 
 script_name(english:"Advanced Poll info.php Remote Information Disclosure");

 script_set_attribute(attribute:"synopsis", value:
"The remote web server contains a PHP script that is affected by an
information disclosure vulnerability." );
 script_set_attribute(attribute:"description", value:
"The remote host is running Chien Kien Uong's Advanced Poll, a simple
Poll system using PHP. 

By default, this utility includes a file named 'info.php' that makes a
call to 'phpinfo()' and displays a lot of information about the remote
host and how PHP is configured.  An attacker may use this flaw to gain
a more intimate knowledge about the remote host and better prepare its
attacks." );
 script_set_attribute(attribute:"see_also", value:"https://www.securityfocus.com/archive/1/342493" );
 script_set_attribute(attribute:"solution", value:
"Delete the affected file." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:U/RC:ND");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"true");
 script_set_attribute(attribute:"plugin_publication_date", value: "2003/03/27");
 script_set_attribute(attribute:"vuln_publication_date", value: "2003/10/25");
 script_cvs_date("Date: 2018/11/28 22:47:41");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();

 script_summary(english:"Checks for the presence of info.php");
 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2003-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
 script_family(english:"CGI abuses");
 script_require_ports("Services/www", 80);
 script_exclude_keys("Settings/disable_cgi_scanning");
 script_dependencies("http_version.nasl");
 script_require_keys("www/PHP");
 exit(0);
}

#
# The script code starts here
#

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80);
if ( !can_host_php(port:port) ) exit(0);


foreach dir (list_uniq(make_list("/poll", cgi_dirs())))
{
 r = http_send_recv3(method:"GET", item:string(dir, "/misc/info.php"), port:port);
 if (isnull(r)) exit(0);
 res = r[2];
 if("<title>phpinfo()</title>" >< res)
 	{
	security_warning(port);
	exit(0);
	}
}