Tenable SecurityCenter 5.4.x <= 5.4.3 PHP Object Deserialization Remote File Deletion (TNS-2017-05)

medium Nessus Plugin ID 97575


An application installed on the remote host is affected by a PHP object deserialization vulnerability.


According to its version, the installation of Tenable SecurityCenter on the remote host is affected by a PHP object deserialization vulnerability in the PluginParser.php script. An authenticated, remote attacker can exploit this, by uploading a specially crafted PHP object, to delete arbitrary files on the remote host.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.


Apply the appropriate patch referenced in the vendor advisory.

See Also


Plugin Details

Severity: Medium

ID: 97575

File Name: securitycenter_5_4_3_tns_2017_05.nasl

Version: 1.17

Type: combined

Agent: unix

Family: Misc.

Published: 3/7/2017

Updated: 11/27/2023

Supported Sensors: Nessus Agent, Nessus

Risk Information

CVSS Score Rationale: Score based on analysis of the vendor advisory.


Risk Factor: Medium

Base Score: 4

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:N

CVSS Score Source: manual


Risk Factor: Medium

Base Score: 4.3

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Vulnerability Information

CPE: cpe:/a:tenable:securitycenter

Patch Publication Date: 2/17/2017

Vulnerability Publication Date: 2/17/2017