ViRobot Linux Server filescan Authentication Bypass

Critical Nessus Network Monitor Plugin ID 3443

Synopsis

The remote web server is affected by an authentication bypass flaw.

Description

The remote host is running ViRobot Linux Server, a commercial anti-virus application server. The installed version of ViRobot Linux Server has a flaw such that an attacker can bypass authentication and gain access to its 'filescan' component by supplying a special cookie. An unauthenticated attacker may be able to leverage this flaw to delete arbitrary files on the remote host or disable access to the service by submitting scans of a large number of large files on the remote host.

Solution

Upgrade or patch according to vendor recommendations.

See Also

http://www.securityfocus.com/archive/1/425788/30/0/threaded

http://www.hauri.net/download/download_linux_patch.php

http://www.globalhauri.com/html

Plugin Details

Severity: Critical

ID: 3443

Family: Web Servers

Published: 2006/02/22

Modified: 2018/07/11

Dependencies: 1442

Nessus ID: 20968

Risk Information

Risk Factor: Critical

CVSSv2

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSSv3

Base Score: 9.8

Temporal Score: 9.1

Vector: CVSS3#AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS3#E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:hauri:virobot

Reference Information

CVE: CVE-2006-0864

BID: 16768