FreeBSD : e107 -- code execution and XSS vulnerabilities (a4746a86-4c89-11df-83fb-0015587e2cc1)

This script is Copyright (C) 2010-2014 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Secunia Research reported two vulnerabilities in e107 :

The first problem affects installations that have the Content Manager
plugin enabled. This plugin does not sanitize the 'content_heading'
parameter correctly and is therefore vulnerable to a cross site
scripting attack.

The second vulnerability is related to the avatar upload
functionality. Images containing PHP code can be uploaded and
executed.

See also :

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=145885
http://e107.org/comment.php?comment.news.864
http://secunia.com/secunia_research/2010-43/
http://secunia.com/secunia_research/2010-44/
http://xforce.iss.net/xforce/xfdb/57932
http://www.nessus.org/u?85aedb59

Solution :

Update the affected package.

Risk factor :

Medium / CVSS Base Score : 6.0
(CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:P)
CVSS Temporal Score : 5.0
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 45586 (freebsd_pkg_a4746a864c8911df83fb0015587e2cc1.nasl)

Bugtraq ID: 39540

CVE ID: CVE-2010-0996
CVE-2010-0997

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now