FreeBSD : froxlor -- database password information leak (9ee72858-4159-11e5-93ad-002590263bf5)

This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

[email protected] reports :

An unauthenticated remote attacker is able to get the database
password via webaccess due to wrong file permissions of the /logs/
folder in froxlor version 0.9.33.1 and earlier. The plain SQL password
and username may be stored in the /logs/sql-error.log file. This
directory is publicly reachable under the default configuration/setup.

Note that froxlor 0.9.33.2 prevents future logging of passwords but
does not retroactively remove passwords already logged. Michael
Kaufmann, the Froxlor lead developer reports :

Removing all .log files from the directory should do the job,
alternatively just use the class.ConfigIO.php from Github

See also :

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=202262
http://seclists.org/oss-sec/2015/q3/238
http://www.nessus.org/u?71339434
http://www.nessus.org/u?087d36a0

Solution :

Update the affected package.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 85369 ()

Bugtraq ID:

CVE ID: CVE-2015-5959

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now