Vulnerabilities > CVE-2005-0689 - Remote Command Execution vulnerability in The Includer 1.0/1.1

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
jimmy
nessus
exploit available

Summary

includer.cgi in The Includer allows remote attackers to execute arbitrary commands via shell metacharacters in (1) the URL or (2) the template parameter.

Vulnerable Configurations

Part Description Count
Application
Jimmy
2

Exploit-Db

  • descriptionThe Includer CGI. CVE-2005-0689. Webapps exploit for cgi platform
    idEDB-ID:922
    last seen2016-01-31
    modified2005-04-08
    published2005-04-08
    reporterGreenwooD
    sourcehttps://www.exploit-db.com/download/922/
    titleThe Includer CGI <= 1.0 - Remote Command Execution 1
  • descriptionThe Includer CGI. CVE-2005-0689. Webapps exploit for cgi platform
    idEDB-ID:923
    last seen2016-01-31
    modified2005-04-08
    published2005-04-08
    reporterK-C0d3r
    sourcehttps://www.exploit-db.com/download/923/
    titleThe Includer CGI <= 1.0 - Remote Command Execution 2
  • descriptionThe Includer CGI <= 1.0 Remote Command Execution. CVE-2005-0689. Webapps exploit for cgi platform
    idEDB-ID:862
    last seen2016-01-31
    modified2005-03-07
    published2005-03-07
    reporterFrancisco Alisson
    sourcehttps://www.exploit-db.com/download/862/
    titleThe Includer CGI <= 1.0 - Remote Command Execution

Nessus

NASL familyCGI abuses
NASL idINCLUDER_RCMDEXEC.NASL
descriptionThe remote host is running The Includer, a PHP script for emulating server-side includes. The version of The Includer installed on the remote host allows an attacker to execute arbitrary shell commands by including shell metacharacters as part of the URL.
last seen2020-06-01
modified2020-06-02
plugin id20296
published2005-12-12
reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/20296
titleThe Includer includer.cgi Arbitrary Command Execution
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(20296);
  script_version("1.19");

  script_cve_id("CVE-2005-0689");
  script_bugtraq_id(12738);

  script_name(english:"The Includer includer.cgi Arbitrary Command Execution");
 
 script_set_attribute(attribute:"synopsis", value:
"The remote web server contains a PHP script that is affected by a
remote code execution vulnerability." );
 script_set_attribute(attribute:"description", value:
"The remote host is running The Includer, a PHP script for emulating
server-side includes. 

The version of The Includer installed on the remote host allows an
attacker to execute arbitrary shell commands by including shell
metacharacters as part of the URL." );
 script_set_attribute(attribute:"see_also", value:"https://marc.info/?l=bugtraq&m=111021730710779&w=2" );
 script_set_attribute(attribute:"solution", value:
"Unknown at this time." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:H/RL:U/RC:ND");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"true");
 script_set_attribute(attribute:"plugin_publication_date", value: "2005/12/12");
 script_set_attribute(attribute:"vuln_publication_date", value: "2005/03/08");
 script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/12");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_end_attributes();
 
  script_summary(english:"The Includer remote command execution detection");
 
  script_category(ACT_ATTACK);
  script_copyright(english:"This script is Copyright (C) 2005-2020 Tenable Network Security, Inc.");
  script_family(english:"CGI abuses");

  script_require_ports("Services/www", 80);
  script_exclude_keys("Settings/disable_cgi_scanning");
  script_dependencies("http_version.nasl");

  exit(0);
}

include("global_settings.inc");
include("http_func.inc");
include("http_keepalive.inc");
include("misc_func.inc");

port = get_http_port(default:80, embedded:TRUE);
if (get_kb_item("Services/www/"+port+"/embedded")) exit(0);

# Loop through directories.
if (thorough_tests) dirs = list_uniq(make_list("/includer", cgi_dirs()));
else dirs = make_list(cgi_dirs());

foreach dir (dirs) {
  req = http_get(
    item:string(
      dir, "/includer.cgi?",
      "template=", SCRIPT_NAME
    ),
    port:port
  );
  res = http_keepalive_send_recv(port:port, data:req, bodyonly:TRUE);
  if (isnull(res)) exit(0);

  if (
    "document.write" >< res &&
    "uid=" >!< res
  ) {
    http_check_remote_code_ka (
      unique_dir:dir,
      check_request:"/includer.cgi?template=|id|",
      check_result:"uid=[0-9]+.*gid=[0-9]+.*",
      command:"id",
      port:port
    );
  }
}