CubeCart 'admin.php' Authentication Bypass Information Disclosure

medium Nessus Plugin ID 42371

Synopsis

A web application running on the remote host has an information disclosure vulnerability.

Description

The version of CubeCart running on the remote host has an authentication bypass vulnerability that could lead to information disclosure. Sending a specially crafted POST request for admin.php bypasses authentication for the administrative user, revealing information such as CubeCart version, PHP version, MySQL version, web server version, and CubeCart license key. A remote attacker could use this information to mount further attacks.

Please note this plugin is similar to Nessus plugin #42353, but performs a slightly different check.

Solution

Upgrade to CubeCart 4.3.6 or later.

See Also

https://forums.cubecart.com/topic/39766-cubecart-436-release-important-security-update/

Plugin Details

Severity: Medium

ID: 42371

File Name: cubecart_admin_info_leak.nasl

Version: 1.12

Type: remote

Family: CGI abuses

Published: 11/4/2009

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: cpe:/a:cubecart:cubecart

Required KB Items: www/cubecart

Excluded KB Items: Settings/disable_cgi_scanning

Patch Publication Date: 11/4/2009

Vulnerability Publication Date: 11/4/2009