Sourcefire Defense Center Multiple Security Vulnerabilities

high Nessus Plugin ID 69441

Synopsis

The remote SourceFire Defense Center installation is affected by several security issues.

Description

The remote host is a SourceFire Defense Center appliance. The remote version of this software is affected by the following vulnerabilities :

- Two arbitrary file download vulnerabilities that allow an attacker to read arbitrary files on the remote file system.

- An arbitrary file deletion vulnerability that allows an attacker to delete arbitrary files on the remote file system.

- A permanent cross site scripting vulnerability.

Solution

Contact the vendor for a patch.

See Also

https://seclists.org/fulldisclosure/2012/Apr/52

Plugin Details

Severity: High

ID: 69441

File Name: sourcefire_defense_center_dir_traversal.nasl

Version: 1.15

Type: remote

Family: CGI abuses

Published: 8/22/2013

Updated: 6/3/2021

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Vulnerability Publication Date: 4/4/2012

Reference Information

BID: 52887

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990

IAVB: 2012-B-0046-S