Lucene search

K
nessusThis script is Copyright (C) 2009-2022 Tenable Network Security, Inc.ZFEEDER_BLANK_CREDENTIALS.NASL
HistoryMar 09, 2009 - 12:00 a.m.

zFeeder admin.php Direct Request Admin Authentication Bypass

2009-03-0900:00:00
This script is Copyright (C) 2009-2022 Tenable Network Security, Inc.
www.tenable.com
39

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.012 Low

EPSS

Percentile

85.5%

The remote host is running zFeeder, an open source PHP application used to aggregate RSS content.

The remote installation of zFeeder is configured by default using empty values for the admin’s username and password. A remote attacker can leverage this issue to gain administrative control of the affected application.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(35803);
  script_version("1.13");
  script_set_attribute(attribute:"plugin_modification_date", value:"2022/04/11");

  script_cve_id("CVE-2009-0807");
  script_xref(name:"EDB-ID", value:"8092");

  script_name(english:"zFeeder admin.php Direct Request Admin Authentication Bypass");

  script_set_attribute(attribute:"synopsis", value:
"The remote web server allows unauthenticated access to its admin
panel.");
  script_set_attribute(attribute:"description", value:
"The remote host is running zFeeder, an open source PHP application
used to aggregate RSS content.

The remote installation of zFeeder is configured by default using
empty values for the admin's username and password.  A remote attacker
can leverage this issue to gain administrative control of the affected
application.");
  script_set_attribute(attribute:"solution", value:
"Access the application's admin panel and change the admin username and
password.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");

  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"exploited_by_nessus", value:"true");
  script_cwe_id(264);

  script_set_attribute(attribute:"plugin_publication_date", value:"2009/03/09");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"default_account", value:"true");
  script_set_attribute(attribute:"thorough_tests", value:"true");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2009-2022 Tenable Network Security, Inc.");

  script_dependencies("http_version.nasl");
  script_require_keys("www/PHP");
  script_exclude_keys("Settings/disable_cgi_scanning");
  script_require_ports("Services/www", 80);

  exit(0);
}

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");


port = get_http_port(default:80, embedded: 0);
if (!can_host_php(port:port)) exit(0);


# Loop through directories.
if (thorough_tests) dirs = list_uniq(make_list("/newsfeeds", cgi_dirs()));
else dirs = make_list(cgi_dirs());

foreach dir (dirs)
{
  # See if admin.php exists and allows uncredentialed configuration access.
  url = string(dir, "/admin.php?zfaction=config");
  res = http_send_recv3(method:"GET", item:url, port:port);
  if (isnull(res))exit(0);

  if ("username :</font>" >< res[2])
  {
    if (report_verbosity > 0)
    {
      report = string(
        "\n",
        "Nessus was able to access the admin panel with empty credentials\n",
        "using the following URL :\n",
        "\n",
        "  ", build_url(port:port, qs:url), "\n"
      );
      security_hole(port:port, extra:report);
    }
    else security_hole(port);
    exit(0);
  }
}

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.012 Low

EPSS

Percentile

85.5%

Related for ZFEEDER_BLANK_CREDENTIALS.NASL