Vulnerabilities > CVE-2005-4148 - Information Disclosure vulnerability in Lyris ListManager Hidden Variable

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
NONE
network
low complexity
lyris-technologies-inc
nessus

Summary

Lyris ListManager 8.5, and possibly other versions before 8.8, includes sensitive information in the env hidden variable, which allows remote attackers to obtain information such as the installation path by requesting a non-existent page and reading the env variable from the resulting error message page.

Nessus

  • NASL familyCGI abuses
    NASL idLISTMANAGER_ERRORMSG_INFO_DISCLOSURE.NASL
    descriptionThe remote host appears to be running ListManager, a web-based commercial mailing list management application from Lyris. In response to a request for a nonexistent page, the version of ListManager on the remote host returns sensitive information such as the installation path and software version as well as possibly SQL queries, code blocks, or the entire CGI environment.
    last seen2020-06-01
    modified2020-06-02
    plugin id20295
    published2005-12-12
    reporterThis script is Copyright (C) 2005-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/20295
    titleListManager Error Message Information Disclosure
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description) {
      script_id(20295);
      script_version("1.26");
    
      script_cve_id("CVE-2005-4148", "CVE-2005-4149");
      script_bugtraq_id(15789);
    
      script_name(english:"ListManager Error Message Information Disclosure");
      script_summary(english:"Checks for error message information disclosure vulnerability in ListManager");
     
     script_set_attribute(attribute:"synopsis", value:
    "The remote web server is vulnerable to an information disclosure
    attack." );
     script_set_attribute(attribute:"description", value:
    "The remote host appears to be running ListManager, a web-based
    commercial mailing list management application from Lyris. 
    
    In response to a request for a nonexistent page, the version of
    ListManager on the remote host returns sensitive information such as
    the installation path and software version as well as possibly SQL
    queries, code blocks, or the entire CGI environment." );
     script_set_attribute(attribute:"see_also", value:"https://seclists.org/fulldisclosure/2005/Dec/374" );
     script_set_attribute(attribute:"solution", value:
    "Unknown at this time." );
     script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
     script_set_cvss_temporal_vector("CVSS2#E:H/RL:U/RC:ND");
     script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N");
     script_set_cvss3_temporal_vector("CVSS:3.0/E:H/RL:U/RC:X");
     script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
     script_set_attribute(attribute:"exploit_available", value:"true");
     script_set_attribute(attribute:"plugin_publication_date", value: "2005/12/12");
     script_set_attribute(attribute:"vuln_publication_date", value: "2005/12/08");
     script_cvs_date("Date: 2018/11/15 20:50:17");
    script_set_attribute(attribute:"plugin_type", value:"remote");
    script_set_attribute(attribute:"exploited_by_nessus", value:"true");
      script_end_attributes();
    
     
      script_category(ACT_ATTACK);
      script_family(english:"CGI abuses");
     
      script_copyright(english:"This script is Copyright (C) 2005-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("http_version.nasl");
      script_require_ports("Services/www", 80);
      script_require_keys("Settings/ParanoidReport");
      exit(0);
    }
    
    
    include("global_settings.inc");
    include("misc_func.inc");
    include("http.inc");
    
    
    port = get_http_port(default:80);
    
    
    # Make sure it's ListManager, unless we're being paranoid.
    banner = get_http_banner(port:port);
    if (
      report_paranoia < 2 &&
      banner && 
      (
        # later versions of ListManager
        "ListManagerWeb/" >!< banner &&
        # earlier versions (eg, 8.5)
        "Server: Tcl-Webserver" >!< banner
      )
    ) exit(0, "ListManager is not running on port "+port);
    
    
    # Try to exploit the flaw.
    url = "/read/rss?forum=" + SCRIPT_NAME;
    w = http_send_recv3(method:"GET", item:url, port:port);
    if (isnull(w)) exit(1, "The web server on port "+port+" did not answer");
    res = w[2];
    
    # There's a problem if we see a bug report form.
    if (egrep(pattern:'<INPUT TYPE="HIDDEN" NAME="(currentdir|env|version)', string:res)) {
      report = '\n' +
        'Nessus was able to uncover some information using the following URL :\n' +
        '\n' +
        "  " +  build_url(port:port, qs:url) +  '\n';
    
      info = "";
      foreach litem (make_list("currentdir", "env", "version"))
      {
        leadin = '<INPUT TYPE="HIDDEN" NAME="' + litem + '" VALUE="';
        if (leadin >< res)
        {
          val = strstr(res, leadin) - leadin;
          val = val - strstr(val, '">');
          info += '  ' + litem + ' : ' + val + '\n';
        }
      }
    
      report += '\n' +
        'Here is the information extracted :\n' +
        '\n' +
        info;
    
      security_report_v4(port:port, extra:report, severity:SECURITY_WARNING);
    
      exit(0);
    }
    
  • NASL familyCGI abuses
    NASL idLISTMANAGER_89B.NASL
    descriptionThe remote host appears to be running ListManager, a web-based commercial mailing list management application from Lyris. The version of ListManager installed on the remote host is affected by a number of input validation flaws. An unauthenticated attacker may be able to exploit these issues to launch SQL injection attacks against the backend database, view the source of any
    last seen2020-06-01
    modified2020-06-02
    plugin id20294
    published2005-12-12
    reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/20294
    titleListManager < 8.9b Multiple Vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description) {
      script_id(20294);
      script_version("1.17");
    
      script_cve_id("CVE-2005-4143", "CVE-2005-4144", "CVE-2005-4146", "CVE-2005-4147", "CVE-2005-4148");
      script_bugtraq_id(15787, 15788);
    
      script_name(english:"ListManager < 8.9b Multiple Vulnerabilities");
      script_summary(english:"Checks for multiple vulnerabilities in ListManager < 8.9b");
     
     script_set_attribute(attribute:"synopsis", value:
    "The remote web server is vulnerable to multiple flaws." );
     script_set_attribute(attribute:"description", value:
    "The remote host appears to be running ListManager, a web-based
    commercial mailing list management application from Lyris. 
    
    The version of ListManager installed on the remote host is affected by
    a number of input validation flaws.  An unauthenticated attacker may
    be able to exploit these issues to launch SQL injection attacks
    against the backend database, view the source of any 'tml' script
    available to the application, bypass authentication, or obtain
    information about the server configuration." );
     script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?e252a917" );
     script_set_attribute(attribute:"see_also", value:"https://seclists.org/fulldisclosure/2005/Dec/374" );
     script_set_attribute(attribute:"solution", value:
    "Upgrade to ListManager 8.9b or later." );
     script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
     script_set_cvss_temporal_vector("CVSS2#E:H/RL:U/RC:ND");
     script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
     script_set_attribute(attribute:"exploit_available", value:"true");
     script_set_attribute(attribute:"plugin_publication_date", value: "2005/12/12");
     script_set_attribute(attribute:"vuln_publication_date", value: "2005/12/08");
     script_cvs_date("Date: 2018/11/15 20:50:17");
    script_set_attribute(attribute:"plugin_type", value:"remote");
    script_end_attributes();
    
     
      script_category(ACT_GATHER_INFO);
      script_family(english:"CGI abuses");
     
      script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.");
    
      script_dependencies("http_version.nasl");
      script_require_ports("Services/www", 80);
    
      exit(0);
    }
    
    include("global_settings.inc");
    include("misc_func.inc");
    include("http.inc");
    
    
    port = get_http_port(default:80);
    
    # Do a banner check.
    banner = get_http_banner(port:port);
    if (
      banner && 
      (
        # later versions of ListManager.
        egrep(pattern:"ListManagerWeb/([0-7]\.|8\.([0-8][^0-9]|9a))", string:banner) ||
        # earlier versions (eg, 8.5)
        (
          "Server: Tcl-Webserver" >< banner &&
          'Www-Authenticate: Basic realm="Lyris ListManager' >< banner
        )
      )
    ) {
     security_hole(port);
     set_kb_item(name: 'www/'+port+'/SQLInjection', value: TRUE);
    }