Vulnerabilities > CVE-2005-1571 - Directory Traversal vulnerability in Wenig and Spitzer-Williams Showoff Digital Media Software 1.5.4

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
NONE
network
low complexity
wenig-and-spitzer-williams
nessus

Summary

Multiple directory traversal vulnerabilities in ShowOff! 1.5.4 allow remote attackers to read arbitrary files via ".." sequences in arguments to the (1) ShowAlbum, (2) ShowVideo, or (3) ShowGraphic scripts.

Vulnerable Configurations

Part Description Count
Application
Wenig_And_Spitzer-Williams
1

Nessus

NASL familyWeb Servers
NASL idSHOWOFF_154_MULT_VULNS.NASL
descriptionThe version of ShowOff! Digital Media Software installed on the remote host suffers from multiple vulnerabilities: - A Denial of Service Vulnerability If Picture Submissions has been enabled (it is off by default), an attacker can cause the software to stop listening for requests by sending a malformed request to the upload port for picture submissions (port 8083 by default). - Multiple Directory Traversal Vulnerabilities An attacker can retrieve files outside the configured web document root, potentially resulting in the disclosure of sensitive information.
last seen2020-06-01
modified2020-06-02
plugin id18249
published2005-05-12
reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/18249
titleShowOff! Digital Media Software <= 1.5.4 Multiple Remote Vulnerabilities
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description) {
  script_id(18249);
  script_version("1.12");

  script_cve_id("CVE-2005-1571", "CVE-2005-1572");
  script_bugtraq_id(13598);
  script_xref(name:"Secunia", value:"15300");

  script_name(english:"ShowOff! Digital Media Software <= 1.5.4 Multiple Remote Vulnerabilities");
 
 script_set_attribute(attribute:"synopsis", value:
"The remote web server is affected by multiple issues." );
 script_set_attribute(attribute:"description", value:
"The version of ShowOff! Digital Media Software installed on the remote
host suffers from multiple vulnerabilities:

  - A Denial of Service Vulnerability
    If Picture Submissions has been enabled (it is off by
    default), an attacker can cause the software to stop
    listening for requests by sending a malformed request
    to the upload port for picture submissions (port 8083
    by default).

  - Multiple Directory Traversal Vulnerabilities
    An attacker can retrieve files outside the configured
    web document root, potentially resulting in the 
    disclosure of sensitive information." );
 script_set_attribute(attribute:"solution", value:
"Unknown at this time." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");
 script_set_attribute(attribute:"plugin_publication_date", value: "2005/05/12");
 script_set_attribute(attribute:"vuln_publication_date", value: "2005/05/10");
 script_cvs_date("Date: 2018/07/27 18:38:15");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();

 
  script_summary(english:"Checks for multiple remote vulnerabilities in ShowOff! Digital Media Software <= 1.5.4");
  script_category(ACT_ATTACK);
  script_family(english:"Web Servers");
  script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.");
  script_dependencies("http_version.nasl");
  script_require_ports("Services/www", 80);

  exit(0);
}

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");


# Make sure the server's banner indicates it's from ShowOff!
port = get_http_port(default:80);
banner = get_http_banner(port:port);
if (!banner) exit(1, "No HTTP banner on port "+port);
if (banner !~ "^Server: ShowOff!") exit(0, "The web server on port "+port+" is not ShowOff.");


# Try to exploit the directory traversal vulnerability.
#
# nb: this exploit requests the file 'ShowOffServer.url' that resides 
#     above the htdocs directory.
w = http_send_recv3(method:"GET", item:"/ShowGraphic?/../ShowOffServer.url", port:port);
if (isnull(w)) exit(1, "The web server on port "+port+" did not answer.");
res = w[2];

# There's a problem if it looks like the file should.
if (egrep(string: res, pattern: "^\[InternetShortcut\]"))
  security_hole(port);