Executive Summary

Summary
Title New bonsai packages fix several vulnerabilities
Informations
Name DSA-265 First vendor Publication 2003-03-21
Vendor Debian Last vendor Modification 2003-03-21
Severity (Vendor) N/A Revision 1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Rémi Perrot fixed several security related bugs in the bonsai, the Mozilla CVS query tool by web interface. Vulnerabilities include arbitrary code execution, cross-site scripting and access to configuration parameters. The Common Vulnerabilities and Exposures project identifies the following problems:

* CAN-2003-0152 - Remote execution of arbitrary commands as www-data

* CAN-2003-0153 - Absolute path disclosure

* CAN-2003-0154 - Cross site scriptiong attacks

* CAN-2003-0155 - Unauthenticated access to parameters page

For the stable distribution (woody) these problems have been fixed in version 1.3+cvs20020224-1woody1.

The old stable distribution (potato) is not affected since it doesn't contain bonsai.

For the unstable distribution (sid) these problems have been fixed in version 1.3+cvs20030317-1.

We recommend that you upgrade your bonsai package.

Original Source

Url : http://www.debian.org/security/2003/dsa-265

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

OpenVAS Exploits

Date Description
2008-01-17 Name : Debian Security Advisory DSA 265-1 (bonsai)
File : nvt/deb_265_1.nasl
2005-11-03 Name : Various dangerous cgi scripts
File : nvt/dangerous_cgis.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
5634 Mozilla Bonsai cvslog.cgi Multiple Parameter XSS

Bonsai contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the "root" or "file" variables upon submission to the "cvslog.cgi" script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
5465 Mozilla Bonsai editparams.cgi Authentication Bypass

Mozilla bonsai CVS query tool contains a flaw that may lead to an unauthorized information disclosure. Bonsai allows a remote attacker to obtain unauthorized access to the parameters page by accessing editparams.cgi directly without authentication. Information obtained may be used to launch further attacks against a system using Bonsai.
5464 Mozilla Bonsai editcheckin.cgi Arbitrary Command Execution

Mozilla Bonsai contains a flaw that may allow a malicious user to execute an arbitrary command. It is possible that the flaw may allow the user to run commands with web server premissions possibility resulting in a loss of confidentiality, integrity, and/or availability.
5463 Mozilla Bonsai multidiff.cgi Path Disclosure

Bonsai contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when an attacker requests the "multidiff.cgi" script with no arguments, which will disclose the physical path resulting in a loss of confidentiality.
5462 Mozilla Bonsai cvsview2.cgi Path Disclosure

Bonsai contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when a remote attacker requests the "cvsview2.cgi" script without arguments, which will disclose the physical path resulting in a loss of confidentiality.
5461 Mozilla Bonsai showcheckins.cgi person Parameter XSS

Bonsai contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the "person" variable upon submission to the "showcheckins.cgi" script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
5460 Mozilla Bonsai cvsblame.cgi Multiple Parameter XSS

Bonsai contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the "root" or "file" variables upon submission to the "cvsblame.cgi" script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
5459 Mozilla Bonsai cvslog.cgi Path Disclosure

Bonsai contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the "rev" variable upon submission to the "cvslog.cgi" script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
5458 Mozilla Bonsai cvsquery.cgi Multiple Parameter XSS

Bonsai contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the "branch", "file", "date", "module", or "who" variables upon submission to the "cvsquery.cgi" script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
5457 Mozilla Bonsai cvsqueryform.cgi module Parameter XSS

Bonsai contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the "module" variables upon submission to the "cvsqueryform.cgi" script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Snort® IPS/IDS

Date Description
2014-01-10 multidiff.cgi access
RuleID : 2199-community - Revision : 18 - Type : SERVER-WEBAPP
2014-01-10 multidiff.cgi access
RuleID : 2199 - Revision : 18 - Type : SERVER-WEBAPP
2014-01-10 cvslog.cgi access
RuleID : 2198-community - Revision : 18 - Type : SERVER-WEBAPP
2014-01-10 cvslog.cgi access
RuleID : 2198 - Revision : 18 - Type : SERVER-WEBAPP
2014-01-10 cvsview2.cgi access
RuleID : 2197-community - Revision : 19 - Type : SERVER-WEBAPP
2014-01-10 cvsview2.cgi access
RuleID : 2197 - Revision : 19 - Type : SERVER-WEBAPP

Nessus® Vulnerability Scanner

Date Description
2004-09-29 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-265.nasl - Type : ACT_GATHER_INFO
2003-06-17 Name : The remote web server may contain some dangerous CGI scripts.
File : dangerous_cgis.nasl - Type : ACT_ATTACK
2003-03-22 Name : The remote host contains a CGI which is vulnerable to multiple flaws allowing...
File : bonsai_flaws.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:31:45
  • Multiple Updates