Lucene search

K
nessusThis script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.MONITORIX_COMMAND_EXEC.NASL
HistoryDec 04, 2013 - 12:00 a.m.

Monitorix Built-in HTTP Server Remote Command Execution

2013-12-0400:00:00
This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
25

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.005 Low

EPSS

Percentile

77.6%

The remote Monitorix built-in HTTP server does not properly sanitize HTTP GET request strings, allowing for remote, arbitrary command execution via a specially crafted HTTP request.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(71212);
  script_version("1.10");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");

  script_cve_id("CVE-2013-7070");
  script_bugtraq_id(64178);

  script_name(english:"Monitorix Built-in HTTP Server Remote Command Execution");
  script_summary(english:"Tries to exploit remote command execution vulnerability");

  script_set_attribute(
    attribute:"synopsis",
    value:
"The remote web server is affected by a remote command execution
vulnerability."
  );
  script_set_attribute(
    attribute:"description",
    value:
"The remote Monitorix built-in HTTP server does not properly sanitize
HTTP GET request strings, allowing for remote, arbitrary command
execution via a specially crafted HTTP request."
  );
  script_set_attribute(attribute:"see_also", value:"https://github.com/mikaku/Monitorix/issues/30");
  script_set_attribute(attribute:"see_also", value:"http://www.monitorix.org/news.html#N331");
  script_set_attribute(attribute:"solution", value:"Upgrade to Monitorix 3.3.1 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2013/11/20");
  script_set_attribute(attribute:"patch_publication_date", value:"2013/11/26");
  script_set_attribute(attribute:"plugin_publication_date", value:"2013/12/04");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"x-cpe:/a:monitorix:monitorix");
  script_end_attributes();

  script_category(ACT_ATTACK);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("http_version.nasl");
  script_exclude_keys("Settings/disable_cgi_scanning");
  script_require_ports("Services/www", 8080);

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:8080, embedded:TRUE);

server_name = http_server_header(port:port);
if ('Monitorix' >!< server_name) audit(AUDIT_NOT_LISTEN, "Monitorix HTTP Server", port);

http_check_remote_code(
  port:port,
  embedded:TRUE,
  check_request:"|id|",
  check_result:"uid=[0-9]+.*gid=[0-9]+.*",
  command:"id"
);
audit(AUDIT_LISTEN_NOT_VULN, "Monitorix HTTP Server", port);
VendorProductVersionCPE
monitorixmonitorixx-cpe:/a:monitorix:monitorix

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.005 Low

EPSS

Percentile

77.6%

Related for MONITORIX_COMMAND_EXEC.NASL