Lucene search

K
nessusThis script is Copyright (C) 2000-2021 Tenable Network Security, Inc.CVSWEB_SHELL.NASL
HistoryJul 15, 2000 - 12:00 a.m.

CVSweb 1.80 cvsweb.cgi Arbitrary Command Execution

2000-07-1500:00:00
This script is Copyright (C) 2000-2021 Tenable Network Security, Inc.
www.tenable.com
29

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.018 Low

EPSS

Percentile

88.0%

The version of CVSweb on the remote host is <= 1.85. This version allows a remote attacker to execute arbitrary commands in the context of the web server.

This version of CVSweb is no longer maintained. Please consider switching to the latest version of FreeBSD CVSweb.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if(description)
{
 script_id(10465);
 script_bugtraq_id(1469);
 script_version("1.26");
 script_cve_id("CVE-2000-0670");
 script_name(english:"CVSweb 1.80 cvsweb.cgi Arbitrary Command Execution");
 script_summary(english:"Checks if CVSweb is present and gets its version");
 
 script_set_attribute(attribute:"synopsis", value:
"The web application running on the remote host has a command
execution vulnerability." );
 script_set_attribute( attribute:"description", value:
"The version of CVSweb on the remote host is <= 1.85.  This version
allows a remote attacker to execute arbitrary commands in the context
of the web server.

This version of CVSweb is no longer maintained.  Please consider
switching to the latest version of FreeBSD CVSweb." );
 # https://web.archive.org/web/20010203164100/http://archives.neohapsis.com/archives/freebsd/2000-08/0096.html
 script_set_attribute(
   attribute:"see_also",
   value:"http://www.nessus.org/u?8973f893"
 );
 script_set_attribute(
   attribute:"see_also",
   value:"https://www.freebsd.org/projects/cvsweb.html"
 );
 script_set_attribute(
   attribute:"solution", 
   value:"Switch to the latest version of CVSweb."
 );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");
 script_set_attribute(attribute:"plugin_publication_date", value: "2000/07/15");
 script_set_attribute(attribute:"vuln_publication_date", value: "2000/07/14");
 script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_end_attributes();
 
 script_category(ACT_GATHER_INFO);
 script_family(english:"CGI abuses");
  
 script_copyright(english:"This script is Copyright (C) 2000-2021 Tenable Network Security, Inc.");

 script_dependencie("find_service1.nasl", "cvsweb_version.nasl");
 script_require_ports("Services/www", 80);

 exit(0);
}

#
# The script code starts here
#

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80);

 name = string("www/", port, "/cvsweb/version");
 version = get_kb_item(name);
 if(version)
 {
 if(ereg(pattern:"^1\.([0-7].*|8[0-5])[^0-9]",
         string:version))
	 	security_hole(port);
 }

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.018 Low

EPSS

Percentile

88.0%

Related for CVSWEB_SHELL.NASL