⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 gb_apache_tomcat_sec_bypass_vuln.nasl

📁 漏洞扫描源码,可以扫描linux,windows,交换机路由器
💻 NASL
字号:
################################################################################ OpenVAS Vulnerability Test# $Id: gb_apache_tomcat_sec_bypass_vuln.nasl 319 2008-10-14 16:40:40Z oct $## Apache Tomcat RemoteFilterValve Security Bypass Vulnerability## Authors:      Chandan S <schandan@secpod.com>## Copyright:# Copyright (c) 2008 Intevation GmbH, http://www.intevation.net## This program is free software; you can redistribute it and/or modify# it under the terms of the GNU General Public License version 2# (or any later version), as published by the Free Software Foundation.## This program is distributed in the hope that it will be useful,# but WITHOUT ANY WARRANTY; without even the implied warranty of# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the# GNU General Public License for more details.## You should have received a copy of the GNU General Public License# along with this program; if not, write to the Free Software# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.###############################################################################if(description){  script_id(800024);  script_version("$Revision: 1.0 $");  script_cve_id("CVE-2008-3271");  script_bugtraq_id(31698);  script_name(english:"Apache Tomcat RemoteFilterValve Security Bypass Vulnerability");  desc["english"] = "  Overview: Apache Tomcat Server is running on this host and that is prone to  security bypass vulnerability.  Vulnerability Insight:  Flaw in the application is due to the synchronisation problem when checking  IP addresses. This could allow user from a non permitted IP address to gain  access to a context that is protected with a valve that extends  RemoteFilterValve including the standard RemoteAddrValve and RemoteHostValve  implementations.  Impact: Successful attempt could lead to remote code execution and attacker  can gain access to context of the filtered value.  Impact Level: Application  Affected Software/OS:  Apache Tomcat version 4.1.x - 4.1.31, and 5.5.0  Fix: Upgrade to Apache Tomcat version 4.1.32, or 5.5.1, or later,  http://archive.apache.org/dist/tomcat/  References:  http://tomcat.apache.org/security-4.html  http://tomcat.apache.org/security-5.html  https://issues.apache.org/bugzilla/show_bug.cgi?id=25835  CVSS Score:    CVSS Base Score     : 5.8 (AV:N/AC:M/Au:NR/C:P/I:P/A:N)    CVSS Temporal Score : 4.3  Risk factor : Medium";  script_description(english:desc["english"]);  script_summary(english:"Check for the version of Apache Tomcat");  script_category(ACT_GATHER_INFO);  script_copyright(english:"Copyright (C) 2008 Intevation GmbH");  script_family(english:"CGI abuses");  script_require_ports("Services/www", 8080);  exit(0);}include("http_func.inc");include("http_keepalive.inc");include("version_func.inc");port = get_http_port(default:8080);if(!port){  port = 8080;}sndReq = http_get(item:string("/index.jsp"), port:port);rcvRes = http_keepalive_send_recv(port:port, data:sndReq, bodyonly:1);if(rcvRes == NULL){  exit(0);}if(egrep(pattern:"<title>Apache Tomcat", string:rcvRes)){  rcvRes = eregmatch(pattern:"Apache Tomcat\/([0-9.]+)", string:rcvRes);  if(rcvRes == NULL){     exit(0);  }  # Apache Tomcat 4.1.0 - 4.1.31, and 5.5.0  if(version_in_range(version:rcvRes[1], test_version:"4.1", test_version2:"4.1.31") ||     version_is_equal(version:rcvRes[1], test_version:"5.5.0")){    security_warning(port);  }}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -