FreeBSD : twiki -- Arbitrary code execution in session files (9227dcaf-827f-11dd-9cd7-0050568452ac)

This script is Copyright (C) 2008-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Th1nk3r reports :

The version of TWiki installed on the remote host allows access to the
'configure' script and fails to sanitize the 'image' parameter of that
script of directory traversal sequences before returning the file
contents when the 'action' parameter is set to 'image'. An
unauthenticated attacker can leverage this issue to view arbitrary
files on the remote host subject to the privileges of the web server
user id. .

See also :

http://twiki.org/cgi-bin/view/Codev/SecurityAlert-CVE-2008-3195
http://www.nessus.org/plugins/index.php?view=single&id=34031
http://www.nessus.org/u?04a3ea00

Solution :

Update the affected package.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 34206 (freebsd_pkg_9227dcaf827f11dd9cd70050568452ac.nasl)

Bugtraq ID:

CVE ID: CVE-2008-3195

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now