📄 apache_log_injection.nasl
字号:
## This script was written by George A. Theall, <theall@tifaware.com>.## See the Nessus Scripts License for details.# if (description) { script_id(12239); script_bugtraq_id(9930); script_version("$Revision: 118 $"); script_cve_id("CVE-2003-0020"); if (defined_func("script_xref")) { script_xref(name:"APPLE-SA", value:"APPLE-SA-2004-05-03"); script_xref(name:"CLSA", value:"CLSA-2004:839"); script_xref(name:"HPSB", value:"HPSBUX01022"); script_xref(name:"RHSA", value:"RHSA-2003:139-07"); script_xref(name:"RHSA", value:"RHSA-2003:243-07"); script_xref(name:"MDKSA", value:"MDKSA-2003:050"); script_xref(name:"OpenPKG-SA", value:"OpenPKG-SA-2004.021-apache"); script_xref(name:"SSA", value:"SSA:2004-133-01"); script_xref(name:"SuSE-SA", value:"SuSE-SA:2004:009"); script_xref(name:"TLSA", value:"TLSA-2004-11"); script_xref(name:"TSLSA", value:"TSLSA-2004-0017"); } name["english"] = "Apache Error Log Escape Sequence Injection"; script_name(english:name["english"]); desc["english"] = "The target is running an Apache web server which allows for theinjection of arbitrary escape sequences into its error logs. Anattacker might use this vulnerability in an attempt to exploit similarvulnerabilities in terminal emulators. ***** OpenVAS has determined the vulnerability exists only by looking at***** the Server header returned by the web server running on the target.Solution : Upgrade to Apache version 1.3.31 or 2.0.49 or newer.Risk factor : Low"; script_description(english:desc["english"]); summary["english"] = "Checks for Apache Error Log Escape Sequence Injection Vulnerability"; script_summary(english:summary["english"]); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2004 George A. Theall"); family["english"] = "General"; script_family(english:family["english"]); if (!defined_func("bn_random") ) script_dependencie("global_settings.nasl", "http_version.nasl"); else script_dependencie("find_service.nes", "global_settings.nasl", "http_version.nasl", "redhat-RHSA-2003-244.nasl", "redhat_fixes.nasl", "macosx_SecUpd20040503.nasl", "macosx_SecUpd20040126.nasl", "macosx_SecUpd20041202.nasl"); script_require_keys("www/apache"); script_require_ports("Services/www", 80); exit(0);}include("backport.inc");include("global_settings.inc");include("http_func.inc");if ( report_paranoia < 2 ) exit(0);host = get_host_name();port = get_http_port(default:80);if (debug_level) display("debug: checking for Apache Error Log Escape Sequence Injection vulnerability on ", host, ":", port, ".\n");if (!get_port_state(port)) exit(0);if (get_kb_item("CVE-2003-0020") || get_kb_item("RHSA-2003-244")) exit(0);# Check the web server's banner for the version.banner = get_http_banner(port: port);if (!banner) exit(0);banner = get_backport_banner(banner:banner);sig = strstr(banner, "Server:");if (!sig) exit(0);if (debug_level) display("debug: server sig = >>", sig, "<<.\n");# For affected versions of Apache, see:# - http://www.apacheweek.com/features/security-13# - http://www.apacheweek.com/features/security-20if(ereg(pattern:"^Server:.*Apache(-AdvancedExtranetServer)?/(1\.([0-2]\.[0-9]|3\.([0-9][^0-9]|[0-2][0-9]))|2\.0.([0-9][^0-9]|[0-3][0-9]|4[0-8]))", string:sig)) { security_warning(port);}
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -