📄 ilohamail_external_progs.nasl
字号:
## This script was written by George A. Theall, <theall@tifaware.com>.## See the Nessus Scripts License for details.#if (description) { script_id(14635); script_version("$Revision: 118 $");# script_cve_id("CVE-MAP-NOMATCH");# NOTE: no CVE id assigned (gat, 09/2004) if (defined_func("script_xref")) { script_xref(name:"OSVDB", value:"7332"); script_xref(name:"OSVDB", value:"7333"); } name["english"] = "IlohaMail External Programs Vulnerabilities"; script_name(english:name["english"]); desc["english"] = "The target is running at least one instance of IlohaMail version0.8.6. This version may contain flaws in the spell check and GnuPGfeatures that allow an authenticated attacker to run arbitrarycommands with the privileges of the web user simply by enclosing themin backticks when spell checking or sending a message. ***** OpenVAS has determined the vulnerability exists on the target***** simply by looking at the version number of IlohaMail ***** installed there.Solution : Upgrade to IlohaMail version 0.8.7 or later or disablespell check and GPG features (see conf/conf.inc).Risk factor : High"; script_description(english:desc["english"]); summary["english"] = "Checks for External Programs vulnerabilities in IlohaMail"; script_summary(english:summary["english"]); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2004 George A. Theall"); family["english"] = "CGI abuses"; script_family(english:family["english"]); script_dependencie("global_settings.nasl", "ilohamail_detect.nasl"); script_require_ports("Services/www", 80); exit(0);}include("global_settings.inc");include("http_func.inc");host = get_host_name();port = get_http_port(default:80);if (debug_level) display("debug: searching for IlohaMail External Programs vulnerabilities on ", host, ":", port, ".\n");if (!get_port_state(port)) exit(0);# Check each installed instance, stopping if we find a vulnerable version.installs = get_kb_list(string("www/", port, "/ilohamail"));if (isnull(installs)) exit(0);foreach install (installs) { matches = eregmatch(string:install, pattern:"^(.+) under (/.*)$"); if (!isnull(matches)) { ver = matches[1]; dir = matches[2]; if (debug_level) display("debug: checking version ", ver, " under ", dir, ".\n"); if (ver =~ "^0\.8\.6") { security_hole(port); exit(0); } }}
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -