Plugins Database As of 12-10-2019

BasiliX Attachment Disclosure Vulnerability

Web application abuses
Impact by CVSS Score
  • ID: 1.3.6.1.4.1.25623.1.0.14306

CVSS Base Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N

Detection Type:
Remote Banner

Solution Type:
Vendor Patch

Recommendations:
Upgrade to BasiliX version 1.1.1 or later.

Summary:
The remote web server contains a series of PHP scripts that are prone to information disclosure. Description : The remote host appears to be running a BasiliX version 1.1.0 or lower. Such versions save attachments by default under '/tmp/BasiliX', which is world-readable and apparently never emptied by BasiliX itself. As a result, anyone with shell access on the affected system or who can place CGI files on it can access attachments uploaded to BasiliX.

Search
Severity
Low
CVSS Score
2.1
Published
2005-11-03 13:08:04
Modified
2019-03-04 09:32:08
CVE
CVE-2002-1711
BID
5065

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.