FreeBSD : bugzilla -- Cross Site Request Forgery (9defb2d6-1404-11e4-8cae-20cf30e32f6d)

This script is Copyright (C) 2014 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

A Bugzilla Security Advisory reports : Adobe does not properly
restrict the SWF file format, which allows remote attackers to conduct
cross-site request forgery (CSRF) attacks against Bugzilla's JSONP
endpoint, possibly obtaining sensitive bug information, via a crafted
OBJECT element with SWF content satisfying the character-set
requirements of a callback API.

See also :

http://www.nessus.org/u?1f0be8ba

Solution :

Update the affected package.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 76854 ()

Bugtraq ID:

CVE ID: CVE-2014-1546

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now