Hello!

Thanks for the submission. But it seems your nasl script does not work
(it has syntax errors!). Have you tested the script?

I made few fixes to your script, but I stopped fixing it because there
is lot more errors. here's the latest one:
openvas-nasl -X remote-ms00-06-kost.nasl
** WARNING : packet forgery will not work
** as NASL is not running as root
[17659]() Unknown escape sequence \/
[17659]() Unknown escape sequence \/
syntax error, unexpected '.', expecting ';'
Parse error at or near line 84

Please, test your script at least with "openvas-nasl -X"

Christian Eric EDJENGUELE wrote:
> Hi all here is the NVT for MS00-06, shortly I'll send the Filemaker, MDNS and 
> EMC Legato information gathering modules. Note that the script_id is missing.
> 
> # OpenVAS Vulnerability Test
> # $Id$
> # Description: 
> # This program test for the following vulnerabilities:
> # Microsoft Index Server File Information and Path Disclosure Vulnerability 
> (MS00-006)
> # Microsoft Index Server 'Malformed Hit-Highlighting' Directory Traversal 
> Vulnerability (MS00-006)
> # Microsoft IIS 'idq.dll' Directory Traversal Vulnerability (MS00-006)
> # Microsoft Index Server ASP Source Code Disclosure Vulnerability (MS00-006)
> #
> # Author:
> # Christian Eric Edjenguele <[EMAIL PROTECTED]>
> #
> # This program is free software; you can redistribute it and/or modify
> # it under the terms of the GNU General Public License version 2 and later,
> # as published by the Free Software Foundation
> #
> # This program is distributed in the hope that it will be useful,
> # but WITHOUT ANY WARRANTY; without even the implied warranty of
> # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
> # GNU General Public License for more details.
> #
> # You should have received a copy of the GNU General Public License
> # along with this program; if not, write to the Free Software
> # Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
> #
> 
>  
>  if(description)
> {
> script_id(00000);
> script_bugtraq_id(950);
> script_xref(name: "Microsoft", value: "MS00-006");
> script_cve_id("CVE-2000-0097");
> name["english"] = "Malformed Hit-Highlighting Argument Vulnerability ";
> script_name(english:name["english"]);
>  
>  desc["english"] = "
> The WebHits ISAPI filter in Microsoft Index Server allows remote attackers to 
> read arbitrary files, 
> aka the "Malformed Hit-Highlighting Argument" vulnerability.  
> 
> Solution :
> To Fix that, you must download the latest upodates from microsoft security 
> website: 
> http://www.microsoft.com/TechNet/security/bulletin/ms00-006.asp.
> Risk factor : Medium";
> script_description(english:desc["english"]);
>  
> summary["english"] = "A vulnerability on Microsoft index server allows 
> unauthorized predictable file location";
> script_summary(english:summary["english"]);
>  
> script_category(ACT_GATHER_INFO);
>  
> script_copyright(english:"This script is under GPL v2 +");
> family["english"] = "General";
> script_family(english:family["english"]);
> script_dependencie("find_service.nes");
> script_require_ports("Services/www", 80);
> 
>  exit(0);
> }
> #
> # The script code starts here
> #
> include("http_func.inc");
> port = get_http_port(default:80);
> # Asp files the plugin will test
> pages  = make_array( 1, 'default.asp', 2, 'iisstart.asp', 3, 'localstart.asp')
> # open http connection to the remote host
> soc = http_open_soc(port);
> if (!soc) return(1);
> # Build the malicious request
>  foreach asp_files (pages)
> {
>  
>  req = http_get( item:string( '\/null.htw?CiWebHitsFile=\/' + asp_file + 
> '%20&CiRestriction=none&CiHiliteType=Full'));
>  send(socket:soc, data: req);
>  
> # Get back the response
> reply_code = recv_line(socket:soc, length:1204);
> if(reply_code)
> {
> reply_header = recv_headers2(socket:soc);
> reply_headers = strcat(reply_code, reply_header);
> reply_body = http_recv_body(socket:soc, headers: reply_headers);
> reply_bodylowerized = reply_body.lower();
> }
> # clode http connection
> http_close_socket(soc);
> # check the reply for vulnerability
> if('Microsoft-IIS' >< reply_headers && reply_code == 200 && string('<html>') 
> >< reply_bodylowerized)
> security_hole(port);
>  ===
> Christian Eric Edjenguele
> IT Security Software Developer & Researcher
> tel. +39 3408580513
> View my linkedin profile: http://www.linkedin.com/in/edjenguele
> My blog: http://www.edjenguele.blogspot.com
> ---
> Management, Developers, Security Professionals – can only result in one 
> thing…… better security.
> http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference Sept 
> 22nd-25th 2008 
> 
> __________________________________________________
> Do You Yahoo!?
> Poco spazio e tanto spam? Yahoo! Mail ti protegge dallo spam e ti da tanto 
> spazio gratuito per i tuoi file e i messaggi 
> http://mail.yahoo.it 
> _______________________________________________
> Openvas-plugins mailing list
> [email protected]
> http://lists.wald.intevation.org/mailman/listinfo/openvas-plugins
# OpenVAS Vulnerability Test
# $Id$
# Description: 
# This program test for the following vulnerabilities:
# Microsoft Index Server File Information and Path Disclosure Vulnerability 
(MS00-006)
# Microsoft Index Server 'Malformed Hit-Highlighting' Directory Traversal 
Vulnerability (MS00-006)
# Microsoft IIS 'idq.dll' Directory Traversal Vulnerability (MS00-006)
# Microsoft Index Server ASP Source Code Disclosure Vulnerability (MS00-006)
#
# Author:
# Christian Eric Edjenguele <[EMAIL PROTECTED]>
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2 and later,
# as published by the Free Software Foundation
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
#

 
 if(description)
{
script_id(99993);
script_bugtraq_id(950);
script_xref(name: "Microsoft", value: "MS00-006");
script_cve_id("CVE-2000-0097");
name["english"] = "Malformed Hit-Highlighting Argument Vulnerability ";
script_name(english:name["english"]);
 
 desc["english"] = "
The WebHits ISAPI filter in Microsoft Index Server allows remote attackers to 
read arbitrary files, 
aka the 'Malformed Hit-Highlighting Argument' vulnerability.  

Solution :
To Fix that, you must download the latest upodates from microsoft security 
website: 
http://www.microsoft.com/TechNet/security/bulletin/ms00-006.asp.
Risk factor : Medium";
script_description(english:desc["english"]);
 
summary["english"] = "A vulnerability on Microsoft index server allows 
unauthorized predictable file location";
script_summary(english:summary["english"]);
 
script_category(ACT_GATHER_INFO);
 
script_copyright(english:"This script is under GPL v2 +");
family["english"] = "General";
script_family(english:family["english"]);
script_dependencie("find_service.nes");
script_require_ports("Services/www", 80);

 exit(0);
}
#
# The script code starts here
#
include("http_func.inc");
port = get_http_port(default:80);
# Asp files the plugin will test
pages  = make_array( 1, 'default.asp', 2, 'iisstart.asp', 3, 'localstart.asp');
# open http connection to the remote host
soc = http_open_soc(port);
if (!soc) return(1);
# Build the malicious request
 foreach asp_files (pages)
{
 
 req = http_get( item:string( '\/null.htw?CiWebHitsFile=\/' + asp_file + 
'%20&CiRestriction=none&CiHiliteType=Full'));
 send(socket:soc, data: req);
 
# Get back the response
reply_code = recv_line(socket:soc, length:1204);
if(reply_code)
{
reply_header = recv_headers2(socket:soc);
reply_headers = strcat(reply_code, reply_header);
reply_body = http_recv_body(socket:soc, headers: reply_headers);
reply_bodylowerized = reply_body.lower();
}
# clode http connection
http_close_socket(soc);
# check the reply for vulnerability
if('Microsoft-IIS' >< reply_headers && reply_code == 200 && string('<html>') >< 
reply_bodylowerized)
security_hole(port);
_______________________________________________
Openvas-plugins mailing list
[email protected]
http://lists.wald.intevation.org/mailman/listinfo/openvas-plugins

Reply via email to