BASE base_maintenance.php Authentication Bypass

medium Nessus Plugin ID 21174

Synopsis

The remote web server contains a PHP script that is prone to an authentication bypass vulnerability.

Description

The remote host is running BASE, a web-based tool for analyzing alerts from one or more SNORT sensors.

The version of BASE installed on the remote host allows a remote attacker to bypass authentication to the 'base_maintenance.php' script and then perform selected maintenance tasks.

Solution

Upgrade to BASE version 1.2.4 or later.

See Also

http://www.nessus.org/u?a8a83b2b

Plugin Details

Severity: Medium

ID: 21174

File Name: base_auth_bypass.nasl

Version: 1.19

Type: remote

Family: CGI abuses

Published: 4/3/2006

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: cpe:/a:secureideas:basic_analysis_and_security_engine

Required KB Items: www/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2/26/2006

Reference Information

CVE: CVE-2006-1505

BID: 17354