code | #
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description) {
script_id(19779);
script_version("1.17");
script_cve_id("CVE-2005-3072", "CVE-2005-3073");
script_bugtraq_id(14931);
script_name(english:"Interchange < 5.0.2 / 5.2.1 Multiple Vulnerabilities (SQLi, Code Exe)");
script_set_attribute(attribute:"synopsis", value:
"The remote web server uses an application server that may be prone to
SQL injection or cross-site scripting attacks." );
script_set_attribute(attribute:"description", value:
"The remote host appears to be running Interchange, an open source
application server that handles state management, authentication,
session maintenance, click trails, filtering, URL encodings, and
security policy.
According to its banner, the installed version of Interchange fails to
sanitize input passed through to the 'forum/submit.html' page, which
may lead to either SQL injection or cross-site scripting attacks." );
# http://www.icdevgroup.org/pipermail/interchange-users/2005-September/043899.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?c36476c6" );
# http://www.icdevgroup.org/pipermail/interchange-users/2005-September/043900.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?354ffb6a" );
script_set_attribute(attribute:"solution", value:
"Upgrade to Interchange 5.0.2 / 5.2.1 or later." );
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
script_set_attribute(attribute:"exploit_available", value:"true");
script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);
script_set_attribute(attribute:"plugin_publication_date", value: "2005/09/26");
script_set_attribute(attribute:"vuln_publication_date", value: "2005/09/22");
script_cvs_date("Date: 2018/06/13 18:56:27");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value: "cpe:/a:interchange_development_group:interchange");
script_end_attributes();
script_summary(english:"Checks for multiple vulnerabilities in Interchange < 5.0.2 / 5.2.1");
script_category(ACT_GATHER_INFO);
script_family(english:"CGI abuses");
script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.");
script_dependencies("http_version.nasl");
script_exclude_keys("Settings/disable_cgi_scanning");
script_require_ports("Services/www", 80);
exit(0);
}
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
port = get_http_port(default:80);
# Loop through CGI directories.
foreach dir (cgi_dirs()) {
# Look for the admin login page -- it has a version number.
w = http_send_recv3(method:"GET", item:string(dir, "/admin/login.html"), port:port);
if (isnull(w)) exit(1, "The web server did not answer");
res = w[2];
# If ...
if (
# it looks like Interchange's admin login page and...
egrep(string:res, pattern:'^<FORM ACTION=".+/process" METHOD=POST name=login>') &&
'<INPUT TYPE=hidden NAME=mv_nextpage VALUE="admin/index">' >< res &&
# the version number is < 5.0.2 / 5.2.0.
egrep(string:res, pattern:"^ +([0-4]\.|5\.(0\.[01]|2\.0)) © 20.+ Interchange Development Group ")
) {
security_hole(port);
set_kb_item(name: 'www/'+port+'/XSS', value: TRUE);
set_kb_item(name: 'www/'+port+'/SQLInjection', value: TRUE);
exit(0);
}
}
|