MapServer < 5.6.9 / 6.0.4 / 6.2.2 / 6.4.1 SQL Injection

This script is Copyright (C) 2014 Tenable Network Security, Inc.


Synopsis :

The remote web server hosts a version of MapServer that may be affected
by a SQL injection vulnerability.

Description :

The version of MapServer hosted on the remote web server may be
affected by a SQL injection vulnerability due to a failure to properly
sanitize user-supplied input. Specifically, the
mPostGISLayerSetTimeFilter function in mappostgis.c does not properly
sanitize user-supplied input passed via PostGIS TIME filters, leading to
a possible unintended disclosure of data.

Note: In order for this vulnerability to be exploited, WMS-Time must be
configured and PostGIS must be in use.

See also :

http://www.nessus.org/u?aae4752e
https://github.com/mapserver/mapserver/issues/4834
http://www.nessus.org/u?0c82eb5b

Solution :

Upgrade to MapServer 5.6.9 / 6.0.4 / 6.2.2 / 6.4.1 or later.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS Temporal Score : 4.3
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: CGI abuses

Nessus Plugin ID: 72094 ()

Bugtraq ID: 64671

CVE ID: CVE-2013-7262