FreeBSD : Bugzilla -- Directory Traversal in (1d96305d-6ae6-11dd-91d5-000c29d47fd7)

This script is Copyright (C) 2008-2015 Tenable Network Security, Inc.

Synopsis :

The remote FreeBSD host is missing one or more security-related

Description :

A Bugzilla Security Advisory reports :

When importing bugs using, the --attach_path option can
be specified, pointing to the directory where attachments to import
are stored. If the XML file being read by contains a
malicious ../relative_path/to/local_file node, the script follows this
relative path and attaches the local file pointed by it to the bug,
making the file public. The security fix makes sure the relative path
is always ignored.

See also :

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.1

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 33904 (freebsd_pkg_1d96305d6ae611dd91d5000c29d47fd7.nasl)

Bugtraq ID:

CVE ID: CVE-2008-4437

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now