FreeBSD : jetty -- multiple vulnerability (0832ee18-cf77-11dc-8c6a-00304881ac9a)

medium Nessus Plugin ID 37252

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Greg Wilkins reports :

jetty allows remote attackers to bypass protection mechanisms and read the source of files via multiple '/' characters in the URI.

Solution

Update the affected package.

See Also

http://jira.codehaus.org/browse/JETTY-386#action_117699

http://www.nessus.org/u?ca6b2bfb

Plugin Details

Severity: Medium

ID: 37252

File Name: freebsd_pkg_0832ee18cf7711dc8c6a00304881ac9a.nasl

Version: 1.15

Type: local

Published: 4/23/2009

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 2.7

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:jetty, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Ease: No known exploits are available

Patch Publication Date: 2/4/2008

Vulnerability Publication Date: 12/22/2007

Reference Information

CVE: CVE-2007-6672

BID: 27117

CWE: 22