FreeBSD : plans -- multiple vulnerabilities (1709084d-4d21-11db-b48d-00508d6a62df)

This script is Copyright (C) 2006-2016 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Secunia reports :

A vulnerability has been reported in Plans, which can be exploited by
malicious people to conduct SQL injection attacks.

Input passed to the 'evt_id' parameter in 'plans.cgi' isn't properly
sanitised before being used in a SQL query. This can be exploited to
manipulate SQL queries by injecting arbitrary SQL code.

Successful exploitation requires that SQL database support has been
enabled in 'plans_config.pl' (the default setting is flat files).

Some vulnerabilities have been reported in Plans, which can be
exploited by malicious people to conduct cross-site scripting attacks
or gain knowledge of sensitive information.

Input passed to various unspecified parameters is not properly
sanitised before being returned to users. This can be exploited to
execute arbitrary HTML and script code in a user's browser session in
context of a vulnerable site.

An unspecified error can be exploited to gain knowledge of the MySQL
password.

See also :

http://www.nessus.org/u?43b1a234
http://www.nessus.org/u?dae60cbd

Solution :

Update the affected package.

Risk factor :

High

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 22451 (freebsd_pkg_1709084d4d2111dbb48d00508d6a62df.nasl)

Bugtraq ID: 14069

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now