Basilic diff.php Command Injection

high Nessus Plugin ID 59850

Synopsis

The bibliography application hosted on the remote web server has a command injection vulnerability.

Description

Basilic, a bibliography server for research laboratories, has a command injection vulnerability. Input to the file parameter of diff.php is not properly sanitized. A remote, unauthenticated attacker could exploit this to execute arbitrary shell commands.

Solution

There is no known solution at this time.

See Also

https://seclists.org/bugtraq/2012/Jul/1

Plugin Details

Severity: High

ID: 59850

File Name: basilic_command_injection.nasl

Version: 1.15

Type: remote

Family: CGI abuses

Published: 7/5/2012

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 7.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:artis.imag:basilic

Required KB Items: www/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 6/30/2012

Exploitable With

Metasploit (Basilic 1.5.14 diff.php Arbitrary Command Execution)

Elliot (Basilic 1.5.14 RCE)

Reference Information

CVE: CVE-2012-3399

BID: 54234