Achievo < 1.4.0 Multiple Vulnerabilities

high Nessus Network Monitor Plugin ID 5208

Synopsis

The remote web server is hosting a PHP application that is vulnerable to multiple attack vectors.

Description

The remote web server is hosting Achievo, a web-based resource management tool. The installed version of Achievo is earlier than 1.4.0. Such versions are potentially affected by multiple issues :

- A persistent cross-site scripting vulnerability in the 'tittle' parameter of the scheduler module. (CVE-2009-2733)

- Multiple cross-site scripting vulnerabilities in the 'atksearch[contractnumber]', 'atksearch_AE_customer[customer]', and 'atksearchmode[contracttype]' parameters of the 'Organisation Contracts' administration page. (CVE-2009-2733)

- A SQL injection vulnerability exists in the 'user_id' parameter of the 'dispatch.php' script. (CVE-2009-2734)

- A remote file-include vulnerability becuase the application fails to sufficiently sanitize user-supplied input to the 'config_atkroot' parameter of the 'debugger.php' script.

Solution

Upgrade to Achievo 1.4.0 or later, as this reportedly fixes the issue.

See Also

http://www.securityfocus.com/archive/1/507131/30/0/threaded

Plugin Details

Severity: High

ID: 5208

Family: CGI

Published: 10/15/2009

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: High

Base Score: 7.3

Temporal Score: 6.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:achievo:achievo

Patch Publication Date: 10/13/2009

Vulnerability Publication Date: 10/13/2009

Exploitable With

Core Impact

Reference Information

CVE: CVE-2009-2733, CVE-2009-2734

BID: 36660, 36661, 36822