Vulnerabilities > CVE-2005-3757 - Remote vulnerability in Google Mini Search Appliance and Search Appliance

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
google
nessus
exploit available
metasploit

Summary

The Saxon XSLT parser in Google Mini Search Appliance, and possibly Google Search Appliance, allows remote attackers to obtain sensitive information and execute arbitrary code via dangerous Java class methods in select attribute of xsl:value-of tags in XSLT style sheets, such as (1) system-property, (2) sys:getProperty, and (3) run:exec.

Vulnerable Configurations

Part Description Count
Hardware
Google
2

Exploit-Db

  • descriptionGoogle Appliance ProxyStyleSheet Command Execution. CVE-2005-3757. Webapps exploit for hardware platform
    idEDB-ID:16907
    last seen2016-02-02
    modified2010-07-01
    published2010-07-01
    reportermetasploit
    sourcehttps://www.exploit-db.com/download/16907/
    titleGoogle Appliance ProxyStyleSheet Command Execution
  • descriptionGoogle Search Appliance proxystylesheet XSLT Java Code Execution. CVE-2005-3757. Remote exploit for hardware platform
    idEDB-ID:1333
    last seen2016-01-31
    modified2005-11-20
    published2005-11-20
    reporterH D Moore
    sourcehttps://www.exploit-db.com/download/1333/
    titleGoogle Search Appliance proxystylesheet XSLT Java Code Execution

Metasploit

descriptionThis module exploits a feature in the Saxon XSLT parser used by the Google Search Appliance. This feature allows for arbitrary java methods to be called. Google released a patch and advisory to their client base in August of 2005 (GA-2005-08-m). The target appliance must be able to connect back to your machine for this exploit to work.
idMSF:EXPLOIT/UNIX/WEBAPP/GOOGLE_PROXYSTYLESHEET_EXEC
last seen2020-01-13
modified2017-07-24
published2007-03-12
referenceshttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3757
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/unix/webapp/google_proxystylesheet_exec.rb
titleGoogle Appliance ProxyStyleSheet Command Execution

Nessus

NASL familyCGI abuses
NASL idGOOGLE_SEARCH_APPLIANCE_PROXYSTYLESHEET.NASL
descriptionThe remote Google Search Appliance / Mini Search Appliance fails to sanitize user-supplied input to the
last seen2020-06-01
modified2020-06-02
plugin id20241
published2005-11-22
reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/20241
titleGoogle Search Appliance proxystylesheet Parameter Multiple Remote Vulnerabilities (XSS, Code Exec, ID)

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/82357/google_proxystylesheet_exec.rb.txt
idPACKETSTORM:82357
last seen2016-12-05
published2009-10-30
reporterH D Moore
sourcehttps://packetstormsecurity.com/files/82357/Google-Appliance-ProxyStyleSheet-Command-Execution.html
titleGoogle Appliance ProxyStyleSheet Command Execution