FreeBSD : p5-Dancer -- possible to abuse session cookie values (968d1e74-1740-11e5-a643-40a8f0757fb4)

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Russell Jenkins reports :

It was possible to abuse session cookie values so that file-based
session stores such as Dancer::Session::YAML or Dancer2::Session::YAML
would attempt to read/write from any file on the filesystem with the
same extension the file-based store uses, such as '*.yml' for the YAML
stores.

See also :

http://www.nessus.org/u?9a56738e
http://www.nessus.org/u?dd45afef

Solution :

Update the affected package.

Risk factor :

High

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 84314 ()

Bugtraq ID:

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now