A quick & dirty test.
It does not exploit the vulnerability and does not try very hard to find
the script (e.g. in the ibill directory)
By the way, why is DDI_Directory_Scanner.nasl disabled?
# This script was written by Michel Arboi <arboi@bigfoot.com>
# GPL
# References:
# Date: Thu, 25 Oct 2001 12:21:37 -0700 (PDT)
# From: "MK Ultra" <mkultra@dqc.org>
# To: bugtraq@securityfocus.com
# Subject: Weak authentication in iBill's Password Management CGI
if(description)
{
#script_id(11083);
script_version ("$Revision$");
name["english"] = "ibillpm.pl";
script_name(english:name["english"]);
desc["english"] = "The 'ibillpm.pl' CGI is installed.
Some versions of this CGI use a weak password management system
that can be brute-forced.
** No flaw was tested. Your script might be a safe version.
Solutions : upgrade the script if possible. If not:
1) Move the script elsewhere (security through obscurity)
2) Request that iBill fix it.
3) Configure your web server so that only addreses from ibill.com
may access it.
Risk factor : Low";
script_description(english:desc["english"]);
summary["english"] = "Checks for the presence of /cgi-bin/ibillpm.pl";
summary["francais"] = "Vérifie la présence de /cgi-bin/ibillpm.pl";
script_summary(english:summary["english"], francais:summary["francais"]);
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2002 Michel Arboi");
family["english"] = "CGI abuses";
family["francais"] = "Abus de CGI";
family["deutsch"] = "CGI Mißbrauch";
script_family(english:family["english"], francais:family["francais"], deutsch:family["deutsch"]);
script_dependencie("find_service.nes", "no404.nasl");
script_require_ports("Services/www", 80);
exit(0);
}
#
port = is_cgi_installed("ibillpm.pl");
if(port)security_warning(port);
# Note: we could try to access it. If we get a 403 the site is safe.
It does not exploit the vulnerability and does not try very hard to find
the script (e.g. in the ibill directory)
By the way, why is DDI_Directory_Scanner.nasl disabled?
# This script was written by Michel Arboi <arboi@bigfoot.com>
# GPL
# References:
# Date: Thu, 25 Oct 2001 12:21:37 -0700 (PDT)
# From: "MK Ultra" <mkultra@dqc.org>
# To: bugtraq@securityfocus.com
# Subject: Weak authentication in iBill's Password Management CGI
if(description)
{
#script_id(11083);
script_version ("$Revision$");
name["english"] = "ibillpm.pl";
script_name(english:name["english"]);
desc["english"] = "The 'ibillpm.pl' CGI is installed.
Some versions of this CGI use a weak password management system
that can be brute-forced.
** No flaw was tested. Your script might be a safe version.
Solutions : upgrade the script if possible. If not:
1) Move the script elsewhere (security through obscurity)
2) Request that iBill fix it.
3) Configure your web server so that only addreses from ibill.com
may access it.
Risk factor : Low";
script_description(english:desc["english"]);
summary["english"] = "Checks for the presence of /cgi-bin/ibillpm.pl";
summary["francais"] = "Vérifie la présence de /cgi-bin/ibillpm.pl";
script_summary(english:summary["english"], francais:summary["francais"]);
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2002 Michel Arboi");
family["english"] = "CGI abuses";
family["francais"] = "Abus de CGI";
family["deutsch"] = "CGI Mißbrauch";
script_family(english:family["english"], francais:family["francais"], deutsch:family["deutsch"]);
script_dependencie("find_service.nes", "no404.nasl");
script_require_ports("Services/www", 80);
exit(0);
}
#
port = is_cgi_installed("ibillpm.pl");
if(port)security_warning(port);
# Note: we could try to access it. If we get a 403 the site is safe.