This script is Copyright (C) 2007-2016 Tenable Network Security, Inc.
The remote Windows host has an application that is affected by
multiple access bypass vulnerabilities.
According to its version number, the installation of SiteKiosk on the
remote host contains an unspecified ActiveX control that is marked as
'safe for scripting' yet exposes two dangerous methods that reading
and downloading of any file from the kiosk. In addition, it fails to
completely sanitize input in its 'skinning' feature before using it to
generate dynamic HTML output. By leveraging either issue, a local user
may be able to view the contents of files on the affected host.
Note that SiteKiosk by default runs with LOCAL SYSTEM privileges.
See also :
Upgrade to SiteKiosk version 6.5.150 or later.
Risk factor :
Medium / CVSS Base Score : 4.1
CVSS Temporal Score : 3.4
Public Exploit Available : true