FreeBSD : Bugzilla -- Directory Traversal in importxml.pl (1d96305d-6ae6-11dd-91d5-000c29d47fd7)

This script is Copyright (C) 2008-2015 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

A Bugzilla Security Advisory reports :

When importing bugs using importxml.pl, the --attach_path option can
be specified, pointing to the directory where attachments to import
are stored. If the XML file being read by importxml.pl contains a
malicious ../relative_path/to/local_file node, the script follows this
relative path and attaches the local file pointed by it to the bug,
making the file public. The security fix makes sure the relative path
is always ignored.

See also :

https://bugzilla.mozilla.org/show_bug.cgi?id=437169
http://www.nessus.org/u?0ca82a5e

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.1
(CVSS2#AV:N/AC:M/Au:N/C:C/I:N/A:N)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 33904 (freebsd_pkg_1d96305d6ae611dd91d5000c29d47fd7.nasl)

Bugtraq ID:

CVE ID: CVE-2008-4437

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now