Hi,

I found the following not reasonable act with web_traversal.nasl.
(under nessus 1.2.7 on Linux Box)

For an Apache Coyote/1.0 on Linux Box, the following lines 
do not evaluate "qc=0" means being disable 'quickcheck'. 

> qc=1;
> k = string("www/no404/", port);
> if (get_kb_item(k)) qc=0;

However, the server returns (status code) 200 with no contents
for the following request r[i]s. Hence, the below check_win_dir_trav
returns 'true' even for non windows servers. 

> i=0;
> r[i] = string("..\\..\\..\\..\\..\\..\\windows\\win.ini");      i=i+1;
> r[i] = string("..\\..\\..\\..\\..\\..\\winnt\\win.ini");        i=i+1;
> r[i] = "/%5c..%5c..%5c..%5cwindows%5cwin.ini";          i=i+1;
> r[i] = "/%5c..%5c..%5c..%5cwindows%5cwin%2eini";        i=i+1;
> r[i] = "/%5c%2e%2e%5c%2e%2e%5c%2e%2e%5cboot.ini";       i=i+1;
> r[i] = "/%2f..%2f..%2f..%2f..%2f..%2f..%2fwindows%2fwin.ini";   i=i+1;
> r[i] = "/%2f..%2f..%2f..%2f..%2f..%2f..%2fwinnt%2fwin.ini";     i=i+1;
> r[i] = 0;
> 
> for (i=0; r[i]; i=i+1)
> {
>   if (check_win_dir_trav(port: port, url: r[i], quickcheck: qc))
>   {
>     security_hole(port);
>     exit(0);
>   }
> }

I'm not sure about these checks and nasl scripts in detal.
However, in my opinion, quickcheck should be disable for this check.

Thanks,
-------
Text by Kosaku Nagasaka. [E-mail: [EMAIL PROTECTED]]
<Remember, success comes in "cans", failure comes in "can'ts".>
*****Note that I may read E-mails in the Text format only.*****

Reply via email to