FreeBSD : Ruby insecure file permissions in the CGI session management (e811aaf1-f015-11d8-876f-00902714cc7c)

low Nessus Plugin ID 14280

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

According to a Debian Security Advisory :

Andres Salomon noticed a problem in the CGI session management of Ruby, an object-oriented scripting language. CGI::Session's FileStore (and presumably PStore [...]) implementations store session information insecurely. They simply create files, ignoring permission issues. This can lead an attacker who has also shell access to the webserver to take over a session.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?c8512db2

https://marc.info/?l=bugtraq&m=109267579822250&w=2

http://www.nessus.org/u?052b3b6d

Plugin Details

Severity: Low

ID: 14280

File Name: freebsd_ruby_181.nasl

Version: 1.18

Type: local

Published: 8/17/2004

Updated: 11/20/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 2.7

CVSS v2

Risk Factor: Low

Base Score: 2.1

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:ruby, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 8/16/2004

Vulnerability Publication Date: 8/16/2004

Reference Information

CVE: CVE-2004-0755

DSA: 537