Allegro RomPager HTTP Cookie Management Remote Code Execution Vulnerability (Misfortune Cookie)

critical Nessus Plugin ID 80228

Synopsis

The remote host is affected by multiple remote code execution vulnerabilities.

Description

According to its banner, the remote host is running a version of Allegro Software RomPager 4.07 to 4.33. It is, therefore, affected by multiple vulnerabilities :

- A flaw in HTTP cookie management in the embedded web server allows a remote attacker to execute arbitrary code with administrative privileges and to possibly conduct attacks against connected devices.
(CVE-2014-9222)

- A digest authentication buffer overflow flaw exists that allows a remote attacker to cause a denial of service or to execute arbitrary code. (CVE-2014-9223)

Solution

Contact the vendor for an updated firmware image. Allegro addressed both issues in mid-2005 with RomPager version 4.34.

See Also

http://www.nessus.org/u?bb698969

http://www.nessus.org/u?2647cb4a

http://www.nessus.org/u?946b7793

http://www.nessus.org/u?22cba06d

Plugin Details

Severity: Critical

ID: 80228

File Name: allegro_software_rompager_webserver.nasl

Version: 1.12

Type: remote

Family: Web Servers

Published: 12/24/2014

Updated: 11/15/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:allegrosoft:rompager

Required KB Items: Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/1/2005

Vulnerability Publication Date: 12/18/2014

Exploitable With

CANVAS (CANVAS)

Reference Information

CVE: CVE-2014-9222, CVE-2014-9223

BID: 71744, 71756

CERT: 561444