RiSearch show.pl Arbitrary File Access

medium Nessus Plugin ID 14222

Synopsis

A web application running on the remote host has an arbitrary file read vulnerability.

Description

The remote host appears to be running RiSearch, a local search engine.

This version contains an information disclosure vulnerability. Passing a local file URI to 'show.pl' reveals that file's contents.
A remote attacker could use this information to read arbitrary files from the system, which could be used to mount further attacks.

Solution

Upgrade to the latest version of this application.

See Also

https://seclists.org/bugtraq/2004/Jul/308

Plugin Details

Severity: Medium

ID: 14222

File Name: risearch_arbitrary_file_access.nasl

Version: 1.23

Type: remote

Family: CGI abuses

Published: 8/4/2004

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Vulnerability Publication Date: 7/27/2004

Reference Information

CVE: CVE-2004-2061

BID: 10812

Secunia: 12173