📄 gb_apache_tomcat_sec_bypass_vuln.nasl
字号:
################################################################################ OpenVAS Vulnerability Test# $Id: gb_apache_tomcat_sec_bypass_vuln.nasl 319 2008-10-14 16:40:40Z oct $## Apache Tomcat RemoteFilterValve Security Bypass Vulnerability## Authors: Chandan S <schandan@secpod.com>## Copyright:# Copyright (c) 2008 Intevation GmbH, http://www.intevation.net## This program is free software; you can redistribute it and/or modify# it under the terms of the GNU General Public License version 2# (or any later version), as published by the Free Software Foundation.## This program is distributed in the hope that it will be useful,# but WITHOUT ANY WARRANTY; without even the implied warranty of# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the# GNU General Public License for more details.## You should have received a copy of the GNU General Public License# along with this program; if not, write to the Free Software# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.###############################################################################if(description){ script_id(800024); script_version("$Revision: 1.0 $"); script_cve_id("CVE-2008-3271"); script_bugtraq_id(31698); script_name(english:"Apache Tomcat RemoteFilterValve Security Bypass Vulnerability"); desc["english"] = " Overview: Apache Tomcat Server is running on this host and that is prone to security bypass vulnerability. Vulnerability Insight: Flaw in the application is due to the synchronisation problem when checking IP addresses. This could allow user from a non permitted IP address to gain access to a context that is protected with a valve that extends RemoteFilterValve including the standard RemoteAddrValve and RemoteHostValve implementations. Impact: Successful attempt could lead to remote code execution and attacker can gain access to context of the filtered value. Impact Level: Application Affected Software/OS: Apache Tomcat version 4.1.x - 4.1.31, and 5.5.0 Fix: Upgrade to Apache Tomcat version 4.1.32, or 5.5.1, or later, http://archive.apache.org/dist/tomcat/ References: http://tomcat.apache.org/security-4.html http://tomcat.apache.org/security-5.html https://issues.apache.org/bugzilla/show_bug.cgi?id=25835 CVSS Score: CVSS Base Score : 5.8 (AV:N/AC:M/Au:NR/C:P/I:P/A:N) CVSS Temporal Score : 4.3 Risk factor : Medium"; script_description(english:desc["english"]); script_summary(english:"Check for the version of Apache Tomcat"); script_category(ACT_GATHER_INFO); script_copyright(english:"Copyright (C) 2008 Intevation GmbH"); script_family(english:"CGI abuses"); script_require_ports("Services/www", 8080); exit(0);}include("http_func.inc");include("http_keepalive.inc");include("version_func.inc");port = get_http_port(default:8080);if(!port){ port = 8080;}sndReq = http_get(item:string("/index.jsp"), port:port);rcvRes = http_keepalive_send_recv(port:port, data:sndReq, bodyonly:1);if(rcvRes == NULL){ exit(0);}if(egrep(pattern:"<title>Apache Tomcat", string:rcvRes)){ rcvRes = eregmatch(pattern:"Apache Tomcat\/([0-9.]+)", string:rcvRes); if(rcvRes == NULL){ exit(0); } # Apache Tomcat 4.1.0 - 4.1.31, and 5.5.0 if(version_in_range(version:rcvRes[1], test_version:"4.1", test_version2:"4.1.31") || version_is_equal(version:rcvRes[1], test_version:"5.5.0")){ security_warning(port); }}
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -