OraMon config/oramon.ini Information Disclosure

medium Nessus Plugin ID 35008

Synopsis

The remote web server contains a PHP application that is prone to an information disclosure vulnerability.

Description

The remote host is running OraMon, an Oracle database monitoring tool written in PHP.

The OraMon installation on the remote host stores its configuration file in the web document directory and fails to restrict access to it. An unauthenticated attacker can retrieve it and discover sensitive information, such as credentials used for connecting to an Oracle database.

Solution

Use a .htaccess file or an equivalent to control access to files in the application's 'config' directory.

Plugin Details

Severity: Medium

ID: 35008

File Name: oramon_ini_info_disclosure.nasl

Version: 1.10

Type: remote

Family: CGI abuses

Published: 12/3/2008

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

Required KB Items: www/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true