Debian DSA-4773-1 : yaws - security update

critical Nessus Plugin ID 141511

Synopsis

The remote Debian host is missing a security-related update.

Description

Two vulnerabilities were discovered in yaws, a high performance HTTP 1.1 webserver written in Erlang.

- CVE-2020-24379 The WebDAV implementation is prone to a XML External Entity (XXE) injection vulnerability.

- CVE-2020-24916 The CGI implementation does not properly sanitize CGI requests allowing a remote attacker to execute arbitrary shell commands via specially crafted CGI executable names.

Solution

Upgrade the yaws packages.

For the stable distribution (buster), these problems have been fixed in version 2.0.6+dfsg-1+deb10u1.

See Also

https://security-tracker.debian.org/tracker/CVE-2020-24379

https://security-tracker.debian.org/tracker/CVE-2020-24916

https://security-tracker.debian.org/tracker/source-package/yaws

https://packages.debian.org/source/buster/yaws

https://www.debian.org/security/2020/dsa-4773

Plugin Details

Severity: Critical

ID: 141511

File Name: debian_DSA-4773.nasl

Version: 1.3

Type: local

Agent: unix

Published: 10/19/2020

Updated: 2/15/2024

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2020-24916

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:yaws, cpe:/o:debian:debian_linux:10.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/16/2020

Vulnerability Publication Date: 9/9/2020

Reference Information

CVE: CVE-2020-24379, CVE-2020-24916

DSA: 4773