FreeBSD : froxlor -- database password information leak (9ee72858-4159-11e5-93ad-002590263bf5)

This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.

Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

[email protected] reports :

An unauthenticated remote attacker is able to get the database
password via webaccess due to wrong file permissions of the /logs/
folder in froxlor version and earlier. The plain SQL password
and username may be stored in the /logs/sql-error.log file. This
directory is publicly reachable under the default configuration/setup.

Note that froxlor prevents future logging of passwords but
does not retroactively remove passwords already logged. Michael
Kaufmann, the Froxlor lead developer reports :

Removing all .log files from the directory should do the job,
alternatively just use the class.ConfigIO.php from Github

See also :

Solution :

Update the affected package.

Risk factor :

Medium / CVSS Base Score : 5.0

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 85369 ()

Bugtraq ID:

CVE ID: CVE-2015-5959

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now