ViRobot Linux Server filescan Authentication Bypass

critical Nessus Plugin ID 20968

Synopsis

The remote web server is affected by an authentication bypass flaw.

Description

The remote host is running ViRobot Linux Server, a commercial antivirus application server.

The installed version of ViRobot Linux Server has a flaw such that an attacker can bypass authentication and gain access to its 'filescan' component by supplying a special cookie. An unauthenticated attacker may be able to leverage this flaw to delete arbitrary files on the remote host or disable access to the service by submitting scans of a large number of large files on the remote host.

Solution

Apply the vendor patch referenced above.

See Also

https://www.securityfocus.com/archive/1/425788/30/0/threaded

http://www.nessus.org/u?aa2f7f08

Plugin Details

Severity: Critical

ID: 20968

File Name: virobot_linux_server_filescan_auth_bypass.nasl

Version: 1.21

Type: remote

Family: CGI abuses

Published: 2/22/2006

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

Exploit Ease: No exploit is required

Vulnerability Publication Date: 2/22/2006

Reference Information

CVE: CVE-2006-0864

BID: 16768