Synopsis
A web application on the remote host has multiple vulnerabilities.
Description
The remote host is running Tutos, an open source team organization software package written in PHP.
According to its banner, the remote version of this software is vulnerable to multiple input validation flaws that could allow an authenticated user to perform a cross-site scripting attack, path disclosure attack or a SQL injection against the remote service.
Solution
Upgrade to Tutos-1.1.20040412 or later.
Plugin Details
File Name: tutos_input_vuln.nasl
Configuration: Enable thorough checks (optional)
Supported Sensors: Nessus
Vulnerability Information
CPE: cpe:/a:tutos:tutos
Required KB Items: www/PHP
Excluded KB Items: Settings/disable_cgi_scanning
Exploit Ease: No exploit is required
Vulnerability Publication Date: 4/13/2004
Reference Information
BID: 10129
CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990