Owl < 0.74.0 Multiple Vulnerabilities

high Nessus Plugin ID 16063

Synopsis

The remote host has an application that is affected by a SQL injection vulnerability.

Description

The remote host is using owl intranet engine, an open source file sharing utility written in php.

The remote version of this software is vulnerable to various flaws, which may allow an attacker to execute arbitrary SQL statements against the remote database or to perform a cross site scripting attack against third-party users by using the remote server.

Solution

Upgrade to Owl 0.74.0 or later.

Plugin Details

Severity: High

ID: 16063

File Name: owl_multiple_flaws.nasl

Version: 1.19

Type: remote

Family: CGI abuses

Published: 12/28/2004

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.6

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:owl:owl_intranet_engine

Required KB Items: www/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Vulnerability Publication Date: 1/1/2005

Reference Information

CVE: CVE-2005-0264, CVE-2005-0265

BID: 12114

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990