Vulnerabilities > CVE-2004-2087 - User Authentication vulnerability in Sandsurfer 1.6.5

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
sandsurfer
nessus

Summary

Unknown vulnerability in SandSurfer before 1.7.0 allows remote attackers to gain access as a logged-in user.

Vulnerable Configurations

Part Description Count
Application
Sandsurfer
1

Nessus

NASL familyCGI abuses
NASL idSANDSURFER_USER_AUTH.NASL
descriptionThe remote host is running SandSurfer, a web-based time keeping application. A vulnerability has been disclosed in all versions of this software, up to version 1.6.5 (included) that could allow an attacker to access the application without authenticating.
last seen2020-06-01
modified2020-06-02
plugin id12059
published2004-02-16
reporterThis script is Copyright (C) 2004-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/12059
titleSandSurfer < 1.7.0 User Authentication Bypass
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if(description)
{
 script_id(12059);
 script_version ("1.17");
 script_cve_id("CVE-2004-2087");
 script_bugtraq_id(9647);
 
 script_name(english:"SandSurfer < 1.7.0 User Authentication Bypass");

 script_set_attribute(attribute:"synopsis", value:
"Access control to a web application can be circumvented." );
 script_set_attribute(attribute:"description", value:
"The remote host is running SandSurfer, a web-based time keeping 
application.

A vulnerability has been disclosed in all versions of this software, 
up to version 1.6.5 (included) that could allow an attacker to access 
the application without authenticating." );
 script_set_attribute(attribute:"solution", value:
"Upgrade to SandSurfer 1.7.0." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"false");

 script_set_attribute(attribute:"plugin_publication_date", value: "2004/02/16");
 script_set_attribute(attribute:"vuln_publication_date", value: "2004/02/08");
 script_cvs_date("Date: 2018/07/27 18:38:14");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();

 script_summary(english:"Checks for SandSurfer");
 script_category(ACT_ATTACK);
 script_copyright(english:"This script is Copyright (C) 2004-2018 Tenable Network Security, Inc."); 
 script_family(english:"CGI abuses");
 script_dependencie("find_service1.nasl", "http_version.nasl");
 script_require_ports("Services/www", 80);
 script_exclude_keys("Settings/disable_cgi_scanning");
 script_require_keys("www/PHP");
 exit(0);
}

# The script code starts here
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80);

if(!can_host_php(port:port))exit(0);

foreach d ( cgi_dirs() )
{
 # SandSurfer installs under $prefix/cgi-bin/login.cgi
 r = http_send_recv3(method: "GET", item:string(d, "/cgi-bin/login.cgi"), port:port);
 if (isnull(r)) exit(0);
 if( egrep(pattern:"SandSurfer (0\.|1\.[0-5]\.)", string: r[1]+r[2])){
 	security_hole(port);
	exit(0);
 }
 r = http_send_recv3(method: "GET", item:string(d, "/login.cgi"), port:port);
 if (isnull(r)) exit(0);
 if( egrep(pattern:"SandSurfer (0\.|1\.[0-5]\.)", string: r[1]+r[2]))
 {
 	security_hole(port);
	exit(0);
 }
}