Mura CMS FILEID Parameter Directory Traversal

medium Nessus Plugin ID 49700

Synopsis

The remote web server includes a ColdFusion script that is affected by a directory traversal vulnerability.

Description

The version of Mura CMS installed on the remote host fails to sanitize user-supplied input to the 'FILEID' parameter of the 'tasks/render/file' script of directory traversal sequences before using it to return the contents of a file.

An unauthenticated, remote attacker can exploit this issue to disclose the contents of sensitive files on the affected system subject to the privileges under which the web server operates.

Solution

Apply the security patch referenced in the vendor's advisory.

See Also

https://www.getmura.com/blog/critical-security-patch/

Plugin Details

Severity: Medium

ID: 49700

File Name: mura_cms_fileid_traversal.nasl

Version: 1.15

Type: remote

Family: CGI abuses

Published: 9/30/2010

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: cpe:/a:blueriver:mura_cms

Required KB Items: www/mura_cms

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 9/11/2010

Vulnerability Publication Date: 9/26/2010

Reference Information

CVE: CVE-2010-3468

BID: 43499