NaviCOPA ::$DATA Extension Request Source Code Disclosure

medium Nessus Plugin ID 41646

Synopsis

The remote web server is affected by an information disclosure vulnerability.

Description

The installed version of the NaviCOPA web server software on the remote host returns the source of scripts hosted on it when '::$DATA' is appended to the request URL. A remote attacker can leverage this issue to view the source code of CGIs and possibly obtain passwords and other sensitive information from this host.

Solution

Upgrade to NaviCOPA 3.01.2 from 17th September 2009 or later as that reportedly addresses the issue.

Plugin Details

Severity: Medium

ID: 41646

File Name: navicopa_source_data.nasl

Version: 1.13

Type: remote

Family: Web Servers

Published: 9/28/2009

Updated: 8/10/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

Required KB Items: www/PHP

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 9/17/2009

Vulnerability Publication Date: 9/16/2009

Reference Information

CVE: CVE-2009-3646

CWE: 200