GOsa Multiple Script plugin Parameter Remote File Inclusion

high Nessus Plugin ID 11275

Synopsis

The remote web server contains a PHP application that is affected by multiple remote file include vulnerabilities.

Description

The remote web server is hosting GOnicus System Administrator (GOsa), a PHP-based administration tool for managing accounts and systems in LDAP databases.

The version of GOsa installed on the remote host fails to sanitize user input to the 'plugin' parameter of several scripts before using it to include PHP code.

An unauthenticated, remote attacker can leverage these issues to view arbitrary files or possibly to execute arbitrary PHP code, possibly taken from third-party hosts.

Note that GOsa reportedly doesn't support disabling PHP's 'register_globals' setting.

Solution

Unknown at this time.

See Also

https://seclists.org/fulldisclosure/2003/Feb/327

Plugin Details

Severity: High

ID: 11275

File Name: GOsa_code_injection.nasl

Version: 1.30

Type: remote

Family: CGI abuses

Published: 2/27/2003

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2003-1412

CVSS v3

Risk Factor: High

Base Score: 8.3

Temporal Score: 7.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

Required KB Items: www/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: No exploit is required

Vulnerability Publication Date: 2/23/2003

Reference Information

CVE: CVE-2003-1412

BID: 6922

CWE: 94