Executive Summary
Summary | |
---|---|
Title | New bonsai packages fix several vulnerabilities |
Informations | |||
---|---|---|---|
Name | DSA-265 | First vendor Publication | 2003-03-21 |
Vendor | Debian | Last vendor Modification | 2003-03-21 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Rémi Perrot fixed several security related bugs in the bonsai, the Mozilla CVS query tool by web interface. Vulnerabilities include arbitrary code execution, cross-site scripting and access to configuration parameters. The Common Vulnerabilities and Exposures project identifies the following problems: * CAN-2003-0152 - Remote execution of arbitrary commands as www-data * CAN-2003-0153 - Absolute path disclosure * CAN-2003-0154 - Cross site scriptiong attacks * CAN-2003-0155 - Unauthenticated access to parameters page For the stable distribution (woody) these problems have been fixed in version 1.3+cvs20020224-1woody1. The old stable distribution (potato) is not affected since it doesn't contain bonsai. For the unstable distribution (sid) these problems have been fixed in version 1.3+cvs20030317-1. We recommend that you upgrade your bonsai package. |
Original Source
Url : http://www.debian.org/security/2003/dsa-265 |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 |
OpenVAS Exploits
Date | Description |
---|---|
2008-01-17 | Name : Debian Security Advisory DSA 265-1 (bonsai) File : nvt/deb_265_1.nasl |
2005-11-03 | Name : Various dangerous cgi scripts File : nvt/dangerous_cgis.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
5634 | Mozilla Bonsai cvslog.cgi Multiple Parameter XSS Bonsai contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the "root" or "file" variables upon submission to the "cvslog.cgi" script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity. |
5465 | Mozilla Bonsai editparams.cgi Authentication Bypass Mozilla bonsai CVS query tool contains a flaw that may lead to an unauthorized information disclosure. Bonsai allows a remote attacker to obtain unauthorized access to the parameters page by accessing editparams.cgi directly without authentication. Information obtained may be used to launch further attacks against a system using Bonsai. |
5464 | Mozilla Bonsai editcheckin.cgi Arbitrary Command Execution Mozilla Bonsai contains a flaw that may allow a malicious user to execute an arbitrary command. It is possible that the flaw may allow the user to run commands with web server premissions possibility resulting in a loss of confidentiality, integrity, and/or availability. |
5463 | Mozilla Bonsai multidiff.cgi Path Disclosure Bonsai contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when an attacker requests the "multidiff.cgi" script with no arguments, which will disclose the physical path resulting in a loss of confidentiality. |
5462 | Mozilla Bonsai cvsview2.cgi Path Disclosure Bonsai contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when a remote attacker requests the "cvsview2.cgi" script without arguments, which will disclose the physical path resulting in a loss of confidentiality. |
5461 | Mozilla Bonsai showcheckins.cgi person Parameter XSS Bonsai contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the "person" variable upon submission to the "showcheckins.cgi" script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity. |
5460 | Mozilla Bonsai cvsblame.cgi Multiple Parameter XSS Bonsai contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the "root" or "file" variables upon submission to the "cvsblame.cgi" script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity. |
5459 | Mozilla Bonsai cvslog.cgi Path Disclosure Bonsai contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the "rev" variable upon submission to the "cvslog.cgi" script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity. |
5458 | Mozilla Bonsai cvsquery.cgi Multiple Parameter XSS Bonsai contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the "branch", "file", "date", "module", or "who" variables upon submission to the "cvsquery.cgi" script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity. |
5457 | Mozilla Bonsai cvsqueryform.cgi module Parameter XSS Bonsai contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the "module" variables upon submission to the "cvsqueryform.cgi" script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | multidiff.cgi access RuleID : 2199-community - Revision : 18 - Type : SERVER-WEBAPP |
2014-01-10 | multidiff.cgi access RuleID : 2199 - Revision : 18 - Type : SERVER-WEBAPP |
2014-01-10 | cvslog.cgi access RuleID : 2198-community - Revision : 18 - Type : SERVER-WEBAPP |
2014-01-10 | cvslog.cgi access RuleID : 2198 - Revision : 18 - Type : SERVER-WEBAPP |
2014-01-10 | cvsview2.cgi access RuleID : 2197-community - Revision : 19 - Type : SERVER-WEBAPP |
2014-01-10 | cvsview2.cgi access RuleID : 2197 - Revision : 19 - Type : SERVER-WEBAPP |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-265.nasl - Type : ACT_GATHER_INFO |
2003-06-17 | Name : The remote web server may contain some dangerous CGI scripts. File : dangerous_cgis.nasl - Type : ACT_ATTACK |
2003-03-22 | Name : The remote host contains a CGI which is vulnerable to multiple flaws allowing... File : bonsai_flaws.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:31:45 |
|