Vulnerabilities > CVE-2005-1640 - Security Bypass vulnerability in ignitionServer

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
the-ignition-project
nessus

Summary

mod_channel.bas in The Ignition Project ignitionServer 0.3.0 to 0.3.6, and possibly earlier versions, does not properly verify whether a host has the owner privileges required to delete IRC channel access entries, which allows remote attackers to bypass intended restrictions.

Nessus

NASL familyMisc.
NASL idIRCD_IGNITION_IRCOP_VULN2.NASL
descriptionThe remote host is running a version of the IgnitionServer IRC service which contains a bug in the way it handles locked channels, as well as a design error regarding the access validation checks. An attacker may use this flaw to block an IRC operator out of a protected channel. A host may use this flaw to delete an entry created by a owner.
last seen2020-06-01
modified2020-06-02
plugin id18291
published2005-05-17
reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/18291
titleignitionServer < 0.3.6-P1 Multiple Vulnerabilities
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if(description)
{
 script_id(18291);
 script_version ("1.8");
 script_cve_id("CVE-2005-1640", "CVE-2005-1641");
 script_bugtraq_id(13656, 13654);
 
 script_name(english:"ignitionServer < 0.3.6-P1 Multiple Vulnerabilities");
 
 script_set_attribute(attribute:"synopsis", value:
"The remote IRC server is affected by multiple vulnerabilities." );
 script_set_attribute(attribute:"description", value:
"The remote host is running a version of the IgnitionServer IRC 
service which contains a bug in the way it handles locked channels, as
well as a design error regarding the access validation checks.

An attacker may use this flaw to block an IRC operator out of a 
protected channel. A host may use this flaw to delete an entry created
by a owner." );
 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?b96598ba" );
 script_set_attribute(attribute:"solution", value:
"Upgrade to IgnitionServer 0.3.6-P1 or newer" );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");

 script_set_attribute(attribute:"plugin_publication_date", value: "2005/05/17");
 script_set_attribute(attribute:"vuln_publication_date", value: "2005/05/15");
 script_cvs_date("Date: 2018/07/12 19:01:16");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();

 
 script_summary(english:"checks the version of the remote ircd");
 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.");
 script_family(english:"Misc.");
 script_dependencie("ircd.nasl");
 script_require_ports("Services/irc", 6667);
 exit(0);
}

#

port = get_kb_item("Services/irc");
if (!port) port = 6667;
if(! get_port_state(port)) exit(0);

key = string("irc/banner/", port);
banner = get_kb_item(key);
if(!banner)exit(0);

if(egrep(pattern:".*ignitionServer 0\.([0-2]\.|3\.[0-5][^0-9]|3\.6[^-]).*", string:banner)) 
 security_hole(port);