FreeBSD : mambo -- 'register_globals' emulation layer overwrite vulnerability (ffb82d3a-610f-11da-8823-00123ffe8333)

This script is Copyright (C) 2006-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

A Secunia Advisory reports :

peter MC tachatte has discovered a vulnerability in Mambo, which can
be exploited by malicious people to manipulate certain information and
compromise a vulnerable system.

The vulnerability is caused due to an error in the 'register_globals'
emulation layer in 'globals.php' where certain arrays used by the
system can be overwritten. This can be exploited to include arbitrary
files from external and local resources via the
'mosConfig_absolute_path' parameter.

Successful exploitation requires that 'register_globals' is disabled.

See also :

http://www.nessus.org/u?17f61011
http://www.nessus.org/u?e9cd00b3

Solution :

Update the affected package.

Risk factor :

High

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 21545 (freebsd_pkg_ffb82d3a610f11da882300123ffe8333.nasl)

Bugtraq ID:

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now