getID3 < 1.7.8-b1 Multiple Remote Vulnerabilities

high Nessus Plugin ID 24746

Synopsis

The remote web server contains a PHP application that is affected by multiple vulnerabilities.

Description

getID3, a web-based tool for extracting information from MP3 files, is installed on the remote web server.

The installation of getID3 includes a set of demo scripts that allow an unauthenticated, remote attacker to read and delete arbitrary files, write files with some restrictions, and execute arbitrary code, all subject to the privileges under which the web server runs.

Note that getID3 may be installed in support of another application, such as the Drupal Audio or Mediafield modules.

Solution

Either remove the getID3 'demos' directory or upgrade to getID3 version 1.7.8b1 or later.

See Also

https://www.drupal.org/node/119385

http://www.nessus.org/u?e0625253

Plugin Details

Severity: High

ID: 24746

File Name: getid3_178.nasl

Version: 1.23

Type: remote

Family: CGI abuses

Published: 3/1/2007

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:drupal:drupal, cpe:/a:drupal:audio_module, cpe:/a:drupal:getid3, cpe:/a:drupal:mediafield_module

Required KB Items: www/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 2/17/2007

Reference Information

CVE: CVE-2007-1035

BID: 22587