FreeBSD : p5-Dancer -- possible to abuse session cookie values (968d1e74-1740-11e5-a643-40a8f0757fb4)

This script is Copyright (C) 2015 Tenable Network Security, Inc.

Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Russell Jenkins reports :

It was possible to abuse session cookie values so that file-based
session stores such as Dancer::Session::YAML or Dancer2::Session::YAML
would attempt to read/write from any file on the filesystem with the
same extension the file-based store uses, such as '*.yml' for the YAML

See also :

Solution :

Update the affected package.

Risk factor :


Family: FreeBSD Local Security Checks

Nessus Plugin ID: 84314 ()

Bugtraq ID:


Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now