VChat Multiple Remote Vulnerabilities

medium Nessus Plugin ID 11471

Language:

Synopsis

The remote host has an application that is affected by multiple vulnerabilities.

Description

It is possible to retrieve the log of all the chat sessions that have occurred on the remote vchat server by requesting the file vchat/msg.txt

An attacker may use this flaw to read past chat sessions and possibly harass its participants.

In addition to this, another flaw in the same product may allow an attacker to consume all the resources of the remote host by sending a long message to this module.

Solution

None at this time. Add a .htaccess file to prevent an attacker from obtaining this file.

Plugin Details

Severity: Medium

ID: 11471

File Name: vchat_logs.nasl

Version: 1.18

Type: remote

Family: CGI abuses

Published: 3/25/2003

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: No exploit is required

Reference Information

BID: 7186, 7188