Google Urchin <= 5.7.03 report.cgi Administrative Bypass

Medium Nessus Network Monitor Plugin ID 4242

Synopsis

The remote host is vulnerable to a flaw that allows for the bypassing of authentication.

Description

The remote host is running the Google Urchin web application.
This version of Urchin is reported prone to a flaw where an attacker can gain administrative access to the application. The 'report.cgi' script fails to adequately verify that the user is authorized. An attacker exploiting this flaw would be able to perform some subset of administrative duties without authentication.

Solution

Upgrade to a version of Urchin higher than 5.7.03.

See Also

http://www.roirevolution.com/urchin

Plugin Details

Severity: Medium

ID: 4242

Family: Generic

Published: 2007/10/12

Modified: 2016/01/21

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 5.8

Temporal Score: 5.5

Vector: CVSS2#AV:A/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:U/RC:ND

CVSSv3

Base Score: 6.3

Temporal Score: 6.2

Vector: CVSS3#AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS3#E:F/RL:U/RC:X

Reference Information

CVE: CVE-2007-5113

BID: 26037