ViRobot Linux Server filescan Authentication Bypass

critical Nessus Network Monitor Plugin ID 3443

Synopsis

The remote web server is affected by an authentication bypass flaw.

Description

The remote host is running ViRobot Linux Server, a commercial anti-virus application server. The installed version of ViRobot Linux Server has a flaw such that an attacker can bypass authentication and gain access to its 'filescan' component by supplying a special cookie. An unauthenticated attacker may be able to leverage this flaw to delete arbitrary files on the remote host or disable access to the service by submitting scans of a large number of large files on the remote host.

Solution

Upgrade or patch according to vendor recommendations.

See Also

http://www.securityfocus.com/archive/1/425788/30/0/threaded

http://www.hauri.net/download/download_linux_patch.php

http://www.globalhauri.com/html

Plugin Details

Severity: Critical

ID: 3443

Family: Web Servers

Published: 2/22/2006

Updated: 3/6/2019

Nessus ID: 20968

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:hauri:virobot

Reference Information

CVE: CVE-2006-0864

BID: 16768