OpenDocMan Access Control Bypass

medium Nessus Plugin ID 13847

Synopsis

The remote host has an application that could allow unauthorized access to certain documents.

Description

The remote host is running OpenDocMan, an open source document management system.

There is a flaw in the remote version of this software that could allow an attacker with a given account to modify the content of some documents he would otherwise not have access to.

Solution

Upgrade to OpenDocMan 1.2.0

Plugin Details

Severity: Medium

ID: 13847

File Name: opendocman_access_control_bypass.nasl

Version: 1.10

Type: remote

Family: CGI abuses

Published: 7/26/2004

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

Required KB Items: www/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: No exploit is required

Reference Information

BID: 10807