FreeBSD : drupal-pubcookie -- authentication may be bypassed (c0fd7890-4346-11db-89cc-000ae42e9b93)

High Nessus Plugin ID 22342


The remote FreeBSD host is missing a security-related update.


The Drupal Project reports :

It is possible for a malicious user to spoof a user's identity by bypassing the login redirection mechanism in the pubcookie module. The malicious user may gain the privileges of the user they are spoofing, including the administrative user.


Update the affected package.

See Also

Plugin Details

Severity: High

ID: 22342

File Name: freebsd_pkg_c0fd7890434611db89cc000ae42e9b93.nasl

Version: $Revision: 1.10 $

Type: local

Published: 2006/09/14

Modified: 2013/06/22

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:drupal-pubcookie, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2006/09/13

Vulnerability Publication Date: 2006/09/08

Reference Information

CVE: CVE-2006-4717