Language:
http://blog.openx.org/08/important-update-for-openx-source-2-8-10-users/
Severity: High
ID: 69371
File Name: openx_2_8_10_backdoor.nasl
Version: 1.10
Type: remote
Family: CGI abuses
Published: 8/15/2013
Updated: 6/5/2024
Configuration: Enable thorough checks
Supported Sensors: Nessus
Enable CGI Scanning: true
Risk Factor: High
Score: 7.4
Risk Factor: High
Base Score: 7.5
Temporal Score: 6.5
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
Risk Factor: High
Base Score: 8.8
Temporal Score: 8.4
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
CPE: cpe:/a:openx:openx
Required KB Items: www/PHP, www/openx
Excluded KB Items: Settings/disable_cgi_scanning
Exploit Available: true
Exploit Ease: No exploit is required
Patch Publication Date: 8/7/2013
Vulnerability Publication Date: 8/6/2013
Metasploit (OpenX Backdoor PHP Code Execution)
CVE: CVE-2013-4211
BID: 61650