# # This script was written by Matt Moore # # Script audit and contributions from Carmichael Security # Erik Anderson # Added BugtraqID # Also covers BugtraqID: 5193 (same Advisory ID#: wp-02-0008) # # See the Nessus Scripts License for details # if(description) { script_id(11042); script_bugtraq_id(5194); script_version("$Revision: 1.16 $"); name["english"] = "Apache Tomcat DOS Device Name XSS"; name["francais"] = "Apache Tomcat DOS Device Name XSS"; script_name(english:name["english"], francais:name["francais"]); desc["english"] = " Synopsis : The remote Apache Tomcat web server is vulnerable to a cross site scripting issue. Description : Apache Tomcat is the servlet container that is used in the official Reference Implementation for the Java Servlet and JavaServer Pages technologies. By making requests for DOS Device names it is possible to cause Tomcat to throw an exception, allowing XSS attacks, e.g: tomcat-server/COM2.IMG%20src='Javascript:alert(document.domain)' (angle brackets omitted) The exception also reveals the physical path of the Tomcat installation. Solution : Upgrade to Apache Tomcat v4.1.3 beta or later. See also : http://www.westpoint.ltd.uk/advisories/wp-02-0008.txt Risk factor : Low / CVSS Base Score : 3 (AV:R/AC:H/Au:NR/C:P/A:N/I:N/B:C)"; script_description(english:desc["english"]); summary["english"] = "Tests for Apache Tomcat DOS Device name XSS Bug"; script_summary(english:summary["english"]); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2002 Matt Moore", francais:"Ce script est Copyright (C) 2002 Matt Moore"); family["english"] = "CGI abuses : XSS"; family["francais"] = "Abus de CGI"; script_family(english:family["english"], francais:family["francais"]); script_dependencie("http_version.nasl", "cross_site_scripting.nasl"); script_require_ports("Services/www", 8080); script_require_keys("www/apache"); exit(0); } # Check starts here include("http_func.inc"); port = get_http_port(default:8080); if(!port || !get_port_state(port)) exit(0); if(get_kb_item(string("www/", port, "/generic_xss"))) exit(0); banner = get_http_banner(port:port); if (!egrep(pattern:"^Server: .*Tomcat/([0-3]\.|4\.0|4\.1\.[0-2][^0-9])", string:banner) ) exit(0); req = http_get(item:"/COM2.", port:port); soc = http_open_socket(port); if(soc) { send(socket:soc, data:req); r = http_recv(socket:soc); http_close_socket(soc); confirmed = string("JavaScript:alert(document.domain)"); confirmed_too = string("java.io.FileNotFoundException"); if ((confirmed >< r) && (confirmed_too >< r)) { security_note(port); } }