[Nikto-discuss] Newbie needs help

David Klein davidkl at ivision.com.au
Thu Sep 17 22:20:47 UTC 2009


Tony,

 

Thanks for emailing!

 

The first thing I want to draw your attention to is the OSVDB entries. 

 

OSVDB stands for Open Source Vulnerability Database; it offers many
lists of current and past vulns.

 

The number that you see in Nikto's report (2799) is the unique OSVDB
vulnerability number. Go to the OSVDB website http://osvdb.org/ and type
"2799" in on the left hand side where it says OSVDB ID Lookup.

 

You will then arrive at the page http://osvdb.org/show/osvdb/2799 I also
recommend on clicking the security focus link within that report as they
often have PoC's of the vuln. 

For example http://www.securityfocus.com/archive/1/344032

Bug is found in this script:

DailyDose v 1.1 (by www.onlinearts.net)

The script (dose.pl) does not check the input:

$data=$ENV{'QUERY_STRING'};

($command,$list,$temp, $id) = split ("&",$data,4);

. . .

local ($template) = "$tempdir/$temp";

open(TEMPL, "$template") || print "no file found $template!";

#open without check var. $temp

Example (listing):

http://www.someserver.com/cgi-bin/dose.pl?daily&somefile.txt&|ls|

^ webserver ----------------------------^vuln
scrpt^req-----^anyfile--------^ unix command 'ls' for list directory.

If you have any further questions feel free to ask! :-)

P.S yes you are vulnerable, you should probably change the perl script
so that it validates (sanitizes) input. 

Regards,

David Klein



________________________________

From: nikto-discuss-bounces at attrition.org
[mailto:nikto-discuss-bounces at attrition.org] On Behalf Of Tony Wasson
Sent: Friday, September 18, 2009 12:47 AM
To: nikto-discuss at attrition.org
Subject: [Nikto-discuss] Newbie needs help

 

I'm a newbie to nikto, have ran several scans and the output has items
like the ones below,

URI

/forum_members.asp?find=%22;}alert('Vulnerable');function%20x(){v%20=%22

HTTP Method

GET

Description

Web Wiz Forums ver. 7.01 and below is vulnerable to Cross Site Scripting
(XSS). CA-2000-02.

Test Links

http://"mywebsite"/forum_members.asp?find=%22;}alert('Vulnerable');funct
ion%20x(){v%20=%22
http:"mywebsiteIP"/forum_members.asp?find=%22;}alert('Vulnerable');funct
ion%20x(){v%20=%22 

OSVDB Entries

OSVDB-0 

URI

/scripts/dose.pl?daily&somefile.txt&|ls|

HTTP Method

GET

Description

DailyDose 1.1 is vulnerable to a directory traversal attack in the
'list' parameter.

Test Links

http://"mywebsite"/scripts/dose.pl?daily&somefile.txt&|ls|
http://"mywebsiteIP"/scripts/dose.pl?daily&somefile.txt&|ls| 

OSVDB Entries

OSVDB-2799 

 

How does one interpret this? do I have an actual vulnerability?

 

Notice: This email message, including any attachments, contains
information belonging to Trinity Industries, Inc. and its business
units. It has been sent solely for the use of the intended recipients
and may be confidential, proprietary, copyrighted, and legally
privileged. If you are not an intended recipient, please advise the
sender of the error and permanently delete all copies of this email,
including any copies that may reside in your deleted box. The
unauthorized review, use, disclosure, distribution, or copying of this
email or its contents is strictly prohibited.

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://attrition.org/pipermail/nikto-discuss/attachments/20090917/6cd0249b/attachment-0001.html 


More information about the Nikto-discuss mailing list