Lucene search

K
openvasCopyright (C) 2013 Greenbone AGOPENVAS:1361412562310103831
HistoryNov 13, 2013 - 12:00 a.m.

Webuzo <= 2.1.3 Cookie Value Handling Remote Command Injection Vulnerability

2013-11-1300:00:00
Copyright (C) 2013 Greenbone AG
plugins.openvas.org
10

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

6.5 Medium

AI Score

Confidence

Low

0.007 Low

EPSS

Percentile

80.3%

Webuzo is prone to a remote command-injection vulnerability
because it fails to adequately sanitize user-supplied input.

# SPDX-FileCopyrightText: 2013 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-or-later

CPE = "cpe:/a:softaculous:webuzo";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.103831");
  script_cve_id("CVE-2013-6041", "CVE-2013-6042", "CVE-2013-6043");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_version("2023-05-16T09:08:27+0000");

  script_name("Webuzo <= 2.1.3 Cookie Value Handling Remote Command Injection Vulnerability");

  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/63483");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/63480");

  script_tag(name:"last_modification", value:"2023-05-16 09:08:27 +0000 (Tue, 16 May 2023)");
  script_tag(name:"creation_date", value:"2013-11-13 18:18:47 +0100 (Wed, 13 Nov 2013)");
  script_category(ACT_GATHER_INFO);
  script_tag(name:"qod_type", value:"remote_banner");
  script_family("Web application abuses");
  script_copyright("Copyright (C) 2013 Greenbone AG");
  script_dependencies("gb_webuzo_detect.nasl");
  script_mandatory_keys("webuzo/installed");

  script_tag(name:"impact", value:"Remote attackers can exploit this issue to execute arbitrary commands
  in the context of the affected application.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"The value of a cookie used by the application is not
  appropriately validated or sanitised before processing and permits backtick characters. This
  allows additional OS commands to be injected and executed on the server system, and may result in
  server compromise.");

  script_tag(name:"solution", value:"Updates are available.");

  script_tag(name:"solution_type", value:"VendorFix");

  script_tag(name:"summary", value:"Webuzo is prone to a remote command-injection vulnerability
  because it fails to adequately sanitize user-supplied input.");

  script_tag(name:"affected", value:"Webuzo versions through 2.1.3 are vulnerable.");

  exit(0);
}

include("host_details.inc");
include("version_func.inc");

if(!port = get_app_port(cpe:CPE))
  exit(0);

if(!vers = get_app_version(cpe:CPE, port:port))
  exit(0);

if(version_is_less_equal(version: vers, test_version: "2.1.3")) {
  report = report_fixed_ver(installed_version:vers, vulnerable_range:"Less than or equal to 2.1.3");
  security_message(port: port, data: report);
  exit(0);
}

exit(99);

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

6.5 Medium

AI Score

Confidence

Low

0.007 Low

EPSS

Percentile

80.3%

Related for OPENVAS:1361412562310103831