⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 deb_925_1.nasl

📁 漏洞扫描源码,可以扫描linux,windows,交换机路由器
💻 NASL
字号:
# OpenVAS Vulnerability Test# $Id$# Description: Auto-generated from advisory DSA 925-1## Authors:# Thomas Reinke <reinke@securityspace.com>## Copyright:# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com# Text descriptions are largerly excerpted from the referenced# advisory, and are Copyright (c) the respective author(s)## This program is free software; you can redistribute it and/or modify# it under the terms of the GNU General Public License version 2,# as published by the Free Software Foundation## This program is distributed in the hope that it will be useful,# but WITHOUT ANY WARRANTY; without even the implied warranty of# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the# GNU General Public License for more details.## You should have received a copy of the GNU General Public License# along with this program; if not, write to the Free Software# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.#if(description){ script_id(56053); if(NASL_LEVEL>=2191) {     script_cve_id("CVE-2005-3310", "CVE-2005-3415", "CVE-2005-3416", "CVE-2005-3417", "CVE-2005-3418", "CVE-2005-3419", "CVE-2005-3420", "CVE-2005-3536", "CVE-2005-3537"); } else {     script_cve_id("CVE-2005-3310", "CVE-2005-3415", "CVE-2005-3416", "CVE-2005-3417", "CVE-2005-3418", "CVE-2005-3419", "CVE-2005-3420", "CVE-2005-3536"); }; script_bugtraq_id(15170,15243); script_version ("$"); name["english"] = "Debian Security Advisory DSA 925-1 (phpbb2)"; script_name(english:name["english"]); desc["english"] = "The remote host is missing an update to phpbb2announced via advisory DSA 925-1.Several vulnerabilities have been discovered in phpBB, a fullyfeatured and skinnable flat webforum,The Common Vulnerabilities and Exposures project identifies thefollowing problems:CVE-2005-3310Multiple interpretation errors allow remote authenticated users toinject arbitrary web script when remote avatars and avataruploading are enabled.CVE-2005-3415phpBB allows remote attackers to bypass protection mechanisms thatderegister global variables that allows attackers to manipulatethe behaviour of phpBB.CVE-2005-3416phpBB allows remote attackers to bypass security checks whenregister_globals is enabled and the session_start function has notbeen called to handle a session.CVE-2005-3417phpBB allows remote attackers to modify global variables andbypass security mechanisms.CVE-2005-3418Multiple cross-site scripting (XSS) vulnerabilities allow remoteattackers to inject arbitrary web scripts.CVE-2005-3419An SQL injection vulnerability allows remote attackers to executearbitrary SQL commands.CVE-2005-3420phpBB allows remote attackers to modify regular expressions andexecute PHP code via the signature_bbcode_uid parameter.CVE-2005-3536Missing input sanitising of the topic type allows remote attackersto inject arbitrary SQL commands.CVE-2005-3537Missing request validation permitted remote attackers to editprivate messages of other users.The old stable distribution (woody) does not contain phpbb2 packages.For the stable distribution (sarge) these problems have been fixed inversion 2.0.13+1-6sarge2.For the unstable distribution (sid) these problems have been fixed inversion 2.0.18-1.We recommend that you upgrade your phpbb2 packages.Solution:https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20925-1Risk factor : High"; script_description(english:desc["english"]); summary["english"] = "Debian Security Advisory DSA 925-1 (phpbb2)"; script_summary(english:summary["english"]); script_category(ACT_GATHER_INFO); script_copyright(english:"Copyright (c) 2005 E-Soft Inc. http://www.securiytspace.com"); family["english"] = "Debian Local Security Checks"; script_family(english:family["english"]); script_dependencies("gather-package-list.nasl"); script_require_keys("ssh/login/packages"); exit(0);}## The script code starts here#include("revisions-lib.inc");include("pkg-lib-deb.inc");vuln = 0;if(isdpkgvuln(pkg:"phpbb2-conf-mysql", ver:"2.0.13-6sarge2", rls:"DEB3.1")) {    vuln = 1;}if(isdpkgvuln(pkg:"phpbb2-languages", ver:"2.0.13-6sarge2", rls:"DEB3.1")) {    vuln = 1;}if(isdpkgvuln(pkg:"phpbb2", ver:"2.0.13-6sarge2", rls:"DEB3.1")) {    vuln = 1;}if(vuln) {    security_hole(0);}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -