Mailing List Archive

ibillpm.pl
A quick & dirty test.
It does not exploit the vulnerability and does not try very hard to find
the script (e.g. in the ibill directory)

By the way, why is DDI_Directory_Scanner.nasl disabled?






# This script was written by Michel Arboi <arboi@bigfoot.com>
# GPL
# References:
# Date: Thu, 25 Oct 2001 12:21:37 -0700 (PDT)
# From: "MK Ultra" <mkultra@dqc.org>
# To: bugtraq@securityfocus.com
# Subject: Weak authentication in iBill's Password Management CGI

if(description)
{
#script_id(11083);
script_version ("$Revision$");

name["english"] = "ibillpm.pl";
script_name(english:name["english"]);

desc["english"] = "The 'ibillpm.pl' CGI is installed.
Some versions of this CGI use a weak password management system
that can be brute-forced.

** No flaw was tested. Your script might be a safe version.

Solutions : upgrade the script if possible. If not:
1) Move the script elsewhere (security through obscurity)
2) Request that iBill fix it.
3) Configure your web server so that only addreses from ibill.com
may access it.

Risk factor : Low";


script_description(english:desc["english"]);

summary["english"] = "Checks for the presence of /cgi-bin/ibillpm.pl";
summary["francais"] = "Vérifie la présence de /cgi-bin/ibillpm.pl";

script_summary(english:summary["english"], francais:summary["francais"]);

script_category(ACT_GATHER_INFO);


script_copyright(english:"This script is Copyright (C) 2002 Michel Arboi");

family["english"] = "CGI abuses";
family["francais"] = "Abus de CGI";
family["deutsch"] = "CGI Mißbrauch";
script_family(english:family["english"], francais:family["francais"], deutsch:family["deutsch"]);
script_dependencie("find_service.nes", "no404.nasl");
script_require_ports("Services/www", 80);
exit(0);
}

#

port = is_cgi_installed("ibillpm.pl");
if(port)security_warning(port);
# Note: we could try to access it. If we get a 403 the site is safe.
Re: ibillpm.pl [ In reply to ]
On Friday 16 August 2002 17:56, Michel Arboi wrote:
> A quick & dirty test.
> It does not exploit the vulnerability and does not try very hard to
> find the script (e.g. in the ibill directory)
>
> By the way, why is DDI_Directory_Scanner.nasl disabled?

Renaud received a number of reports that the large number of sockets it
opened was causing nessusd to puke and die. He disabled the plugin in CVS
until we tracked down what the problem was. I haven't been able to
reproduce this, but until the plugin is re-enabled there is not point in
me submitting the augmented plugins which use the results from this
script.

-HD