Basilix Webmail tmp Directory Permission Weakness Attachment Disclosure

low Nessus Plugin ID 14306

Synopsis

The remote web server contains a series of PHP scripts that are prone to information disclosure.

Description

The remote host appears to be running a BasiliX version 1.1.0 or lower. Such versions save attachments by default under '/tmp/BasiliX', which is world-readable and apparently never emptied by BasiliX itself. As a result, anyone with shell access on the affected system or who can place CGI files on it can access attachments uploaded to BasiliX.

Solution

Upgrade to BasiliX version 1.1.1 or later.

See Also

http://www.nessus.org/u?b3972e49

Plugin Details

Severity: Low

ID: 14306

File Name: basilix_attachment_disclosure.nasl

Version: 1.22

Type: remote

Family: CGI abuses

Published: 8/9/2004

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Low

Base Score: 2.1

Temporal Score: 2.1

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

Required KB Items: www/basilix

Exploit Available: true

Exploit Ease: No exploit is required

Vulnerability Publication Date: 6/18/2002

Reference Information

CVE: CVE-2002-1711

BID: 5065