Hi team,
i want to proposed the following change for plugin apache_server_status.

patch 1:
We got servers returning 403 forbidden access and setting filename '/server_status' in data body, when plugin access the file.
  This make the plugin to declare the vulnerability when it should not.

  We introduce some change : Plugin now check http server code return,
  And set the vulnerability, only when http code 200 is return.

patch 2:
This patch proposal is description break-up for openvas6.0-beta5 feature.

Can you give feedback about, and accept the change for next nvt update ?

--
"Le saviez-vous ? la technologie d'ITrust va sécuriser le cloud français"

    | Sébastien AUCOUTURIER | Responsable R&D
    | ITrust | 55 L'Occitane 31670 LABEGE
    | Email: [email protected]
    | Fixe Sdt. 05.67.34.67.80
    | IT Security Services & SaaS Editor
--- apache_server_status.nasl	2013-01-07 16:07:44.000000000 +0100
+++ /rewrite/plugins/apache_server_status.nasl	2013-07-24 08:31:20.557438068 +0200
@@ -4,9 +4,11 @@
 #
 # Authors:
 # Vincent Renardias <[email protected]>
+# Mercier Daniel <[email protected]>
 #
 # Copyright:
 # Copyright (C) 2001 StrongHoldNet
+#               2013 ITrust, http://www.itrust.fr
 #
 # This program is free software; you can redistribute it and/or modify
 # it under the terms of the GNU General Public License version 2,
@@ -75,8 +77,7 @@
 {
   buffer = http_get(item:"/server-status", port:port);
   data = http_keepalive_send_recv(port:port, data:buffer);
-  if( str >< data )
-  {
-   security_warning(port);
-  }
+  if(ereg(pattern:"^HTTP/[0-9]\.[0-9] 200 ", string:data)) security_warning(port);
+  exit (0);
 }
+
--- /rewrite/plugins/apache_server_status.nasl  2013-07-24 08:31:20.557438068 
+0200
+++ /rewrite/plugins/apache_server_status.nasl.6.0      2013-07-24 
09:16:49.415826276 +0200
@@ -23,13 +23,60 @@
 # along with this program; if not, write to the Free Software
 # Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
 #
+include("revisions-lib.inc");
 
 if(description)
 {
+tag_summary =
+  "Leak of information in Apache.";
+
+tag_detection =
+  "Check if /server-status page exist.";
+
+tag_impact =
+  "Requesting the URI /server-status gives information about
+the currently running Apache.";
+
+tag_affected =
+  "All Apache version.";
+
+tag_solution = 
+"If you don't use this feature, comment the appropriate section in
+your httpd.conf file. If you really need it, limit its access to
+the administrator's machine.";
+
+desc = "
+  Summary:
+  " + tag_summary + "
+
+  Vulnerability Detection:
+  " + tag_detection + "
+
+  Vulnerability Insight:
+  " + tag_insight + "
+
+  Impact:
+  " + tag_impact + "
+
+  Affected Software/OS:
+  " + tag_affected + "
+
+  Solution:
+  " + tag_solution;
+
+ if (revcomp(a: OPENVAS_VERSION, b: "6.0+beta5") >= 0){                        
                                                          
+   script_tag(name : "summary" , value : tag_summary);                         
                                                          
+   script_tag(name : "vuldetect" , value : tag_detection);                     
                                                          
+   script_tag(name : "solution" , value : tag_solution);                       
                                                          
+   script_tag(name : "insight" , value : tag_insight);                         
                                                          
+   script_tag(name : "affected" , value : tag_affected);                       
                                                          
+   script_tag(name : "impact" , value : tag_impact);                           
                                                          
+ }
+
  script_id(10677);
  script_version("$Revision: 14994 $");
  script_tag(name:"last_modification", value:"$Date: 2012-12-31 12:37:58 +0100 
(Mon, 31 Dec 2012) $");
- script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 
Nov 2005)");
+ script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 
Nov 2005)"); 
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:P");
  script_tag(name:"risk_factor", value:"Medium");
@@ -37,15 +84,6 @@
  
  script_name(name);
  
- desc = "
-Requesting the URI /server-status gives information about
-the currently running Apache.
-
-Solution : 
-If you don't use this feature, comment the appropriate section in
-your httpd.conf file. If you really need it, limit its access to
-the administrator's machine.";
-
  script_description(desc);
  
  summary = "Makes a request like http://www.example.com/server-status";;
@@ -71,7 +109,6 @@
 include("http_keepalive.inc");
 
 port = get_http_port(default:80);
-str = "Apache Server Status";
 
 if(get_port_state(port))
 {
_______________________________________________
Openvas-plugins mailing list
[email protected]
https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-plugins

Reply via email to