Synopsis
A web application running on the remote host has a security bypass vulnerability.
Description
The remote host is running Mensajeitor Tag Board.
According to its banner, the remote version of Mensajeitor has a security bypass vulnerability. Admin authentication can be bypassed by passing a value 'si' to the 'AdminNick' parameter.
A remote attacker could exploit this issue to post messages with administrative privileges.
Solution
Upgrade to Mensajeitor 1.8.9 r2 or later.
Plugin Details
File Name: mensajeitor_admin_bypass.nasl
Supported Sensors: Nessus
Vulnerability Information
Excluded KB Items: Settings/disable_cgi_scanning
Exploit Ease: No exploit is required
Reference Information
BID: 10774