FreeBSD : joomla -- flaw in the reset token validation (8514b6e7-6f0f-11dd-b3db-001c2514716c)

This script is Copyright (C) 2008-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Joomla project reports :

A flaw in the reset token validation mechanism allows for
non-validating tokens to be forged. This will allow an
unauthenticated, unauthorized user to reset the password of the first
enabled user (lowest id). Typically, this is an administrator user.
Note, that changing the first users username may lessen the impact of
this exploit (since the person who changed the password does not know
the login associated with the new password). However, the only way to
completely rectify the issue is to upgrade to 1.5.6 (or patch the
/components/com_user/models/reset.php file).

See also :

http://www.nessus.org/u?9e8affc9

Solution :

Update the affected package.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 34018 (freebsd_pkg_8514b6e76f0f11ddb3db001c2514716c.nasl)

Bugtraq ID:

CVE ID: CVE-2008-3681

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now