Lucene search

K
openvasCopyright (C) 2001 SecuriTeam & Copyright (C) 2001 Noam RathausOPENVAS:136141256231010748
HistoryNov 03, 2005 - 12:00 a.m.

Mediahouse Statistics Web Server Detect

2005-11-0300:00:00
Copyright (C) 2001 SecuriTeam & Copyright (C) 2001 Noam Rathaus
plugins.openvas.org
13

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

AI Score

6.5

Confidence

Low

EPSS

0.026

Percentile

90.5%

We detected the remote web server as a
Mediahouse Statistics web server. This web server suffers from a security
vulnerability that enables attackers to gain sensitive information on the
current logged events on the public web server (the server being monitored
by MediaHouse).

This information includes: who is on (currently surfing users), the user

# SPDX-FileCopyrightText: 2001 Noam Rathaus
# SPDX-FileCopyrightText: 2001 SecuriTeam
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

# Could also cover BugtraqID:734, CVE:CVE-1999-0931

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.10748");
  script_version("2023-09-06T05:05:19+0000");
  script_tag(name:"last_modification", value:"2023-09-06 05:05:19 +0000 (Wed, 06 Sep 2023)");
  script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/1568");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_cve_id("CVE-2000-0776");
  script_name("Mediahouse Statistics Web Server Detect");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2001 SecuriTeam & Copyright (C) 2001 Noam Rathaus");
  script_family("Web Servers");
  script_dependencies("gb_get_http_banner.nasl");
  script_require_ports("Services/www", 80);
  script_mandatory_keys("Statistics_Server/banner");

  script_tag(name:"solution", value:"Block the web server's port number on your Firewall, and
  upgrade to the latest version if necessary.");

  script_tag(name:"summary", value:"We detected the remote web server as a
  Mediahouse Statistics web server. This web server suffers from a security
  vulnerability that enables attackers to gain sensitive information on the
  current logged events on the public web server (the server being monitored
  by MediaHouse).

  This information includes: who is on (currently surfing users), the user's
  actions, customer's IP addresses, referrer URLs, hidden directories, web
  server usernames and passwords, and more.

  Some versions of the product also suffer from a flaw that allows attackers
  to overflow an internal buffer causing it to execute arbitrary code.");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"remote_banner");

  exit(0);
}

include("http_func.inc");
include("port_service_func.inc");

port = http_get_port(default:80);
buf  = http_get_remote_headers(port:port);
if(!buf)
  exit(0);

if(egrep(pattern:"^Server: Statistics Server", string:buf)) {

  buf = strstr(buf, "Location: ");
  buf = buf - "Location: ";
  subbuf = strstr(buf, string("\n"));
  buf = buf - subbuf;
  buf = buf - raw_string(0x0D);
  soc = http_open_socket(port);
  if(soc) {
    req = http_get(item:buf, port:port);
    send(socket:soc, data:req);
    buf = http_recv(socket:soc);
    http_close_socket(soc);

    if ("Statistics Server " >< buf) {
      buf = strstr(buf, "<TITLE>Statistics Server ");
      buf = buf - "<TITLE>Statistics Server ";
      subbuf = strstr(buf, "</TITLE>");
      buf = buf - subbuf;
      buf = buf - "</TITLE>";
      version = buf;

      buf = "Remote host is running Statistics Server version: ";
      buf = buf + version;
      if(ereg(pattern:"(([0-4]\.[0-9].*)|5\.0[0-2])", string:version)) {
        report = string("According to its version number, the remote MediaHouse\n",
                        "Statistics Server is vulnerable to a buffer overflow that\n",
                        "allows anyone to execute arbitrary code as root.\n\n",
                        "Solution: Upgrade to version 5.03 or newer");
        security_message(data:report, port:port);
      } else {
        security_message(port:port);
      }
    }
  }
}

exit(99);

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

AI Score

6.5

Confidence

Low

EPSS

0.026

Percentile

90.5%

Related for OPENVAS:136141256231010748