ELOG < 2.6.1 Multiple Remote Vulnerabilities (Traversal, FS)

medium Nessus Plugin ID 20750

Synopsis

The remote web server is affected by multiple flaws.

Description

The remote host appears to be using ELOG, a web-based electronic logbook application.

The version of ELOG installed on the remote host fails to filter directory traversal strings before processing GET requests. An attacker can exploit this issue to retrieve the contents of arbitrary files from the remote host, subject to the privileges under which ELOG runs.

In addition, the application is reportedly affected by a format string vulnerability in the 'write_logfile'. Provided logging is enabled, an attacker may be able to exploit this via the 'uname' parameter of the login form to crash the application or execute arbitrary code remotely.

Solution

Upgrade to ELOG version 2.6.1 or later.

See Also

https://midas.psi.ch/elogs/Forum/1608

Plugin Details

Severity: Medium

ID: 20750

File Name: elog_261.nasl

Version: 1.22

Type: remote

Family: CGI abuses

Published: 1/20/2006

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

Exploit Available: true

Exploit Ease: No exploit is required

Vulnerability Publication Date: 10/25/2005

Reference Information

CVE: CVE-2006-0347, CVE-2006-0348

BID: 16315