RealPage Module Upload ActiveX Control Multiple Vulnerabilities

This script is Copyright (C) 2010-2016 Tenable Network Security, Inc.


Synopsis :

The remote Windows host has an ActiveX control that is affected by
multiple vulnerabilities.

Description :

The RealPage Module Upload ActiveX control, used with RealPage's
OneSite Property Management Systems software and installed on the
remote Windows host, reportedly is affected by several
vulnerabilities :

- The 'Upload' method in combination with the
'SourceFile' and 'DestURL' properties can be abused to
upload arbitrary files from a user's system to a web
server. (CVE-2010-2584)

- By setting a long 'SourceFile' or 'DestURL' property
value, an attack can trigger a buffer overflow and
possibly execute arbitrary code. (CVE-2010-2585)

See also :

http://secunia.com/secunia_research/2010-118/
http://secunia.com/secunia_research/2010-119/

Solution :

Upgrade to version 1.0.0.10 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.9
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 50434 ()

Bugtraq ID: 44302

CVE ID: CVE-2010-2584
CVE-2010-2585

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now