ID 26E1C48A-9FA7-11DF-81B5-00E0814CAB4E Type freebsd Reporter FreeBSD Modified 2010-07-28T00:00:00
Description
Piwik versions 0.6 through 0.6.3 are vulnerable to arbitrary,
remote file inclusion using a directory traversal pattern infinite
a crafted request for a data renderer.
A vulnerability has been reported in Piwik, which can before
exploited by malicious people to disclose potentially
sensitive information. Input passed to unspecified parameters
when requesting a data renderer is not properly verified before
being used to include files. This can be exploited to includes
arbitrary files from local resources via directory traversal
attacks.
{"id": "26E1C48A-9FA7-11DF-81B5-00E0814CAB4E", "bulletinFamily": "unix", "title": "Piwik -- Local File Inclusion Vulnerability", "description": "\nPiwik versions 0.6 through 0.6.3 are vulnerable to arbitrary,\n\t remote file inclusion using a directory traversal pattern infinite\n\t a crafted request for a data renderer.\n\nA vulnerability has been reported in Piwik, which can before\n\t exploited by malicious people to disclose potentially\n\t sensitive information. Input passed to unspecified parameters\n\t when requesting a data renderer is not properly verified before\n\t being used to include files. This can be exploited to includes\n\t arbitrary files from local resources via directory traversal\n\t attacks.\n\n", "published": "2010-07-28T00:00:00", "modified": "2010-07-28T00:00:00", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "href": "https://vuxml.freebsd.org/freebsd/26e1c48a-9fa7-11df-81b5-00e0814cab4e.html", "reporter": "FreeBSD", "references": ["http://secunia.com/advisories/40703"], "cvelist": ["CVE-2010-2786"], "type": "freebsd", "lastseen": "2019-05-29T18:34:06", "history": [{"bulletin": {"affectedPackage": [{"OS": "FreeBSD", "OSVersion": "any", "arch": "noarch", "operator": "lt", "packageFilename": "UNKNOWN", "packageName": "piwik", "packageVersion": "0.6.3"}], "bulletinFamily": "unix", "cvelist": ["CVE-2010-2786"], "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "description": "\nPiwik versions 0.6 through 0.6.3 are vulnerable to arbitrary,\n\t remote file inclusion using a directory traversal pattern infinite\n\t a crafted request for a data renderer.\n\nA vulnerability has been reported in Piwik, which can before\n\t exploited by malicious people to disclose potentially\n\t sensitive information. Input passed to unspecified parameters\n\t when requesting a data renderer is not properly verified before\n\t being used to include files. This can be exploited to includes\n\t arbitrary files from local resources via directory traversal\n\t attacks.\n\n", "edition": 1, "enchantments": {"score": {"value": 2.1, "vector": "NONE"}}, "hash": "60a13b390ede8bc9d86f6544d8732664edfe9bdf46273689f453cd634749f17f", "hashmap": [{"hash": "a3dc630729e463135f4e608954fa6e19", "key": "reporter"}, {"hash": "0c7467d62b5bb74dd384faad810a66c7", "key": "published"}, {"hash": "55f678f888931ea2f9f900018973c3f3", "key": "references"}, {"hash": "32c2e7037500f2d7f6106f3d97c62283", "key": "cvelist"}, {"hash": "4913a9178621eadcdf191db17915fbcb", "key": "bulletinFamily"}, {"hash": "5b238142274a7619fbd0f0a5d9e4fbfb", "key": "description"}, {"hash": "1527e888767cdce15d200b870b39cfd0", "key": "type"}, {"hash": "737e2591b537c46d1ca7ce6f0cea5cb9", "key": "cvss"}, {"hash": "0c7467d62b5bb74dd384faad810a66c7", "key": "modified"}, {"hash": "f55dbadd910b27d47c4e2b0c5ddf7b4e", "key": "title"}, {"hash": "0715c4a75ceed8e6c036784f0f2d474a", "key": "affectedPackage"}, {"hash": "79be0f587381a560013f09a20c4c76fa", "key": "href"}], "history": [], "href": "https://vuxml.freebsd.org/freebsd/26e1c48a-9fa7-11df-81b5-00e0814cab4e.html", "id": "26E1C48A-9FA7-11DF-81B5-00E0814CAB4E", "lastseen": "2016-09-26T17:24:48", "modified": "2010-07-28T00:00:00", "objectVersion": "1.2", "published": "2010-07-28T00:00:00", "references": ["http://secunia.com/advisories/40703"], "reporter": "FreeBSD", "title": "Piwik -- Local File Inclusion Vulnerability", "type": "freebsd", "viewCount": 2}, "differentElements": ["cvss"], "edition": 1, "lastseen": "2016-09-26T17:24:48"}, {"bulletin": {"affectedPackage": [{"OS": "FreeBSD", "OSVersion": "any", "arch": "noarch", "operator": "lt", "packageFilename": "UNKNOWN", "packageName": "piwik", "packageVersion": "0.6.3"}], "bulletinFamily": "unix", "cvelist": ["CVE-2010-2786"], "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "description": "\nPiwik versions 0.6 through 0.6.3 are vulnerable to arbitrary,\n\t remote file inclusion using a directory traversal pattern infinite\n\t a crafted request for a data renderer.\n\nA vulnerability has been reported in Piwik, which can before\n\t exploited by malicious people to disclose potentially\n\t sensitive information. Input passed to unspecified parameters\n\t when requesting a data renderer is not properly verified before\n\t being used to include files. This can be exploited to includes\n\t arbitrary files from local resources via directory traversal\n\t attacks.\n\n", "edition": 3, "enchantments": {"dependencies": {"modified": "2018-08-31T01:15:20", "references": [{"idList": ["OPENVAS:67866", "OPENVAS:136141256231067866"], "type": "openvas"}, {"idList": ["FREEBSD_PKG_26E1C48A9FA711DF81B500E0814CAB4E.NASL"], "type": "nessus"}, {"idList": ["E-164"], "type": "dsquare"}, {"idList": ["CVE-2010-2786"], "type": "cve"}]}, "score": {"value": 2.1, "vector": "NONE"}}, "hash": "60a13b390ede8bc9d86f6544d8732664edfe9bdf46273689f453cd634749f17f", "hashmap": [{"hash": "a3dc630729e463135f4e608954fa6e19", "key": "reporter"}, {"hash": "0c7467d62b5bb74dd384faad810a66c7", "key": "published"}, {"hash": "55f678f888931ea2f9f900018973c3f3", "key": "references"}, {"hash": "32c2e7037500f2d7f6106f3d97c62283", "key": "cvelist"}, {"hash": "4913a9178621eadcdf191db17915fbcb", "key": "bulletinFamily"}, {"hash": "5b238142274a7619fbd0f0a5d9e4fbfb", "key": "description"}, {"hash": "1527e888767cdce15d200b870b39cfd0", "key": "type"}, {"hash": "737e2591b537c46d1ca7ce6f0cea5cb9", "key": "cvss"}, {"hash": "0c7467d62b5bb74dd384faad810a66c7", "key": "modified"}, {"hash": "f55dbadd910b27d47c4e2b0c5ddf7b4e", "key": "title"}, {"hash": "0715c4a75ceed8e6c036784f0f2d474a", "key": "affectedPackage"}, {"hash": "79be0f587381a560013f09a20c4c76fa", "key": "href"}], "history": [], "href": "https://vuxml.freebsd.org/freebsd/26e1c48a-9fa7-11df-81b5-00e0814cab4e.html", "id": "26E1C48A-9FA7-11DF-81B5-00E0814CAB4E", "lastseen": "2018-08-31T01:15:20", "modified": "2010-07-28T00:00:00", "objectVersion": "1.3", "published": "2010-07-28T00:00:00", "references": ["http://secunia.com/advisories/40703"], "reporter": "FreeBSD", "title": "Piwik -- Local File Inclusion Vulnerability", "type": "freebsd", "viewCount": 4}, "differentElements": ["cvss"], "edition": 3, "lastseen": "2018-08-31T01:15:20"}, {"bulletin": {"affectedPackage": [{"OS": "FreeBSD", "OSVersion": "any", "arch": "noarch", "operator": "lt", "packageFilename": "UNKNOWN", "packageName": "piwik", "packageVersion": "0.6.3"}], "bulletinFamily": "unix", "cvelist": ["CVE-2010-2786"], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "\nPiwik versions 0.6 through 0.6.3 are vulnerable to arbitrary,\n\t remote file inclusion using a directory traversal pattern infinite\n\t a crafted request for a data renderer.\n\nA vulnerability has been reported in Piwik, which can before\n\t exploited by malicious people to disclose potentially\n\t sensitive information. Input passed to unspecified parameters\n\t when requesting a data renderer is not properly verified before\n\t being used to include files. This can be exploited to includes\n\t arbitrary files from local resources via directory traversal\n\t attacks.\n\n", "edition": 2, "enchantments": {"score": {"value": 2.1, "vector": "NONE"}}, "hash": "a12b699c583219bd969c5a69cedc4ba8644f80fc9d881b297acc71d770bcf250", "hashmap": [{"hash": "a3dc630729e463135f4e608954fa6e19", "key": "reporter"}, {"hash": "0c7467d62b5bb74dd384faad810a66c7", "key": "published"}, {"hash": "55f678f888931ea2f9f900018973c3f3", "key": "references"}, {"hash": "32c2e7037500f2d7f6106f3d97c62283", "key": "cvelist"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "4913a9178621eadcdf191db17915fbcb", "key": "bulletinFamily"}, {"hash": "5b238142274a7619fbd0f0a5d9e4fbfb", "key": "description"}, {"hash": "1527e888767cdce15d200b870b39cfd0", "key": "type"}, {"hash": "0c7467d62b5bb74dd384faad810a66c7", "key": "modified"}, {"hash": "f55dbadd910b27d47c4e2b0c5ddf7b4e", "key": "title"}, {"hash": "0715c4a75ceed8e6c036784f0f2d474a", "key": "affectedPackage"}, {"hash": "79be0f587381a560013f09a20c4c76fa", "key": "href"}], "history": [], "href": "https://vuxml.freebsd.org/freebsd/26e1c48a-9fa7-11df-81b5-00e0814cab4e.html", "id": "26E1C48A-9FA7-11DF-81B5-00E0814CAB4E", "lastseen": "2018-08-30T19:15:23", "modified": "2010-07-28T00:00:00", "objectVersion": "1.3", "published": "2010-07-28T00:00:00", "references": ["http://secunia.com/advisories/40703"], "reporter": "FreeBSD", "title": "Piwik -- Local File Inclusion Vulnerability", "type": "freebsd", "viewCount": 2}, "differentElements": ["cvss"], "edition": 2, "lastseen": "2018-08-30T19:15:23"}], "edition": 4, "hashmap": [{"key": "affectedPackage", "hash": "0715c4a75ceed8e6c036784f0f2d474a"}, {"key": "bulletinFamily", "hash": "4913a9178621eadcdf191db17915fbcb"}, {"key": "cvelist", "hash": "32c2e7037500f2d7f6106f3d97c62283"}, {"key": "cvss", "hash": "4cac367be6dd8242802053610be9dee6"}, {"key": "description", "hash": "5b238142274a7619fbd0f0a5d9e4fbfb"}, {"key": "href", "hash": "79be0f587381a560013f09a20c4c76fa"}, {"key": "modified", "hash": "0c7467d62b5bb74dd384faad810a66c7"}, {"key": "published", "hash": "0c7467d62b5bb74dd384faad810a66c7"}, {"key": "references", "hash": "55f678f888931ea2f9f900018973c3f3"}, {"key": "reporter", "hash": "a3dc630729e463135f4e608954fa6e19"}, {"key": "title", "hash": "f55dbadd910b27d47c4e2b0c5ddf7b4e"}, {"key": "type", "hash": "1527e888767cdce15d200b870b39cfd0"}], "hash": "7187a95eb7e3896d066f4a3a06a7ebb3be4a41a58d05248e54e9f9916697be11", "viewCount": 4, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2010-2786"]}, {"type": "openvas", "idList": ["OPENVAS:67866", "OPENVAS:136141256231067866"]}, {"type": "dsquare", "idList": ["E-164"]}, {"type": "nessus", "idList": ["FREEBSD_PKG_26E1C48A9FA711DF81B500E0814CAB4E.NASL"]}], "modified": "2019-05-29T18:34:06"}, "score": {"value": 5.4, "vector": "NONE", "modified": "2019-05-29T18:34:06"}, "vulnersScore": 5.4}, "objectVersion": "1.3", "affectedPackage": [{"OS": "FreeBSD", "OSVersion": "any", "arch": "noarch", "operator": "lt", "packageFilename": "UNKNOWN", "packageName": "piwik", "packageVersion": "0.6.3"}], "scheme": null}
{"cve": [{"lastseen": "2019-11-22T13:21:07", "bulletinFamily": "NVD", "description": "Directory traversal vulnerability in Piwik 0.6 through 0.6.3 allows remote attackers to include arbitrary local files and possibly have unspecified other impact via directory traversal sequences in a crafted data-renderer request.", "modified": "2019-11-21T13:30:00", "id": "CVE-2010-2786", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2786", "published": "2010-08-02T22:00:00", "title": "CVE-2010-2786", "type": "cve", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "openvas": [{"lastseen": "2017-07-02T21:09:50", "bulletinFamily": "scanner", "description": "The remote host is missing an update to the system\nas announced in the referenced advisory.", "modified": "2017-02-10T00:00:00", "published": "2010-08-21T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=67866", "id": "OPENVAS:67866", "title": "FreeBSD Ports: piwik", "type": "openvas", "sourceData": "#\n#VID 26e1c48a-9fa7-11df-81b5-00e0814cab4e\n# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from VID 26e1c48a-9fa7-11df-81b5-00e0814cab4e\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The following package is affected: piwik\n\nCVE-2010-2786\nDirectory traversal vulnerability in Piwik 0.6 through 0.6.3 allows\nremote attackers to include arbitrary local files and possibly have\nunspecified other impact via directory traversal sequences in a\ncrafted data-renderer request.\";\ntag_solution = \"Update your system with the appropriate patches or\nsoftware upgrades.\n\nhttp://secunia.com/advisories/40703\nhttp://www.vuxml.org/freebsd/26e1c48a-9fa7-11df-81b5-00e0814cab4e.html\";\ntag_summary = \"The remote host is missing an update to the system\nas announced in the referenced advisory.\";\n\n\n\nif(description)\n{\n script_id(67866);\n script_version(\"$Revision: 5263 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-02-10 14:45:51 +0100 (Fri, 10 Feb 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-08-21 08:54:16 +0200 (Sat, 21 Aug 2010)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_cve_id(\"CVE-2010-2786\");\n script_name(\"FreeBSD Ports: piwik\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"FreeBSD Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/freebsdrel\", \"login/SSH/success\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-bsd.inc\");\n\ntxt = \"\";\nvuln = 0;\nbver = portver(pkg:\"piwik\");\nif(!isnull(bver) && revcomp(a:bver, b:\"0.6\")>0 && revcomp(a:bver, b:\"0.6.3\")<0) {\n txt += 'Package piwik version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\n\nif(vuln) {\n security_message(data:string(txt));\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-01-02T10:54:05", "bulletinFamily": "scanner", "description": "The remote host is missing an update to the system\nas announced in the referenced advisory.", "modified": "2017-12-25T00:00:00", "published": "2010-08-21T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231067866", "id": "OPENVAS:136141256231067866", "type": "openvas", "title": "FreeBSD Ports: piwik", "sourceData": "#\n#VID 26e1c48a-9fa7-11df-81b5-00e0814cab4e\n# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from VID 26e1c48a-9fa7-11df-81b5-00e0814cab4e\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The following package is affected: piwik\n\nCVE-2010-2786\nDirectory traversal vulnerability in Piwik 0.6 through 0.6.3 allows\nremote attackers to include arbitrary local files and possibly have\nunspecified other impact via directory traversal sequences in a\ncrafted data-renderer request.\";\ntag_solution = \"Update your system with the appropriate patches or\nsoftware upgrades.\n\nhttp://secunia.com/advisories/40703\nhttp://www.vuxml.org/freebsd/26e1c48a-9fa7-11df-81b5-00e0814cab4e.html\";\ntag_summary = \"The remote host is missing an update to the system\nas announced in the referenced advisory.\";\n\n\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.67866\");\n script_version(\"$Revision: 8244 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-25 08:29:28 +0100 (Mon, 25 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-08-21 08:54:16 +0200 (Sat, 21 Aug 2010)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_cve_id(\"CVE-2010-2786\");\n script_name(\"FreeBSD Ports: piwik\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"FreeBSD Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/freebsdrel\", \"login/SSH/success\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-bsd.inc\");\n\ntxt = \"\";\nvuln = 0;\nbver = portver(pkg:\"piwik\");\nif(!isnull(bver) && revcomp(a:bver, b:\"0.6\")>0 && revcomp(a:bver, b:\"0.6.3\")<0) {\n txt += 'Package piwik version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\n\nif(vuln) {\n security_message(data:string(txt));\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "dsquare": [{"lastseen": "2019-05-29T15:31:57", "bulletinFamily": "exploit", "description": "Local file include vulnerability in Piwik format parameter\n\nVulnerability Type: Local File Include", "modified": "2013-04-02T00:00:00", "published": "2012-04-27T00:00:00", "id": "E-164", "href": "", "type": "dsquare", "title": "Piwik 0.6.3 LFI", "sourceData": "For the exploit source code contact DSquare Security sales team.", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "nessus": [{"lastseen": "2019-11-01T02:37:15", "bulletinFamily": "scanner", "description": "Piwik versions 0.6 through 0.6.3 are vulnerable to arbitrary, remote\nfile inclusion using a directory traversal pattern infinite a crafted\nrequest for a data renderer.\n\nA vulnerability has been reported in Piwik, which can before exploited\nby malicious people to disclose potentially sensitive information.\nInput passed to unspecified parameters when requesting a data renderer\nis not properly verified before being used to include files. This can\nbe exploited to includes arbitrary files from local resources via\ndirectory traversal attacks.", "modified": "2019-11-02T00:00:00", "id": "FREEBSD_PKG_26E1C48A9FA711DF81B500E0814CAB4E.NASL", "href": "https://www.tenable.com/plugins/nessus/48250", "published": "2010-08-05T00:00:00", "title": "FreeBSD : Piwik -- Local File Inclusion Vulnerability (26e1c48a-9fa7-11df-81b5-00e0814cab4e)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2019 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(48250);\n script_version(\"1.11\");\n script_cvs_date(\"Date: 2019/08/02 13:32:40\");\n\n script_cve_id(\"CVE-2010-2786\");\n script_xref(name:\"Secunia\", value:\"40703\");\n\n script_name(english:\"FreeBSD : Piwik -- Local File Inclusion Vulnerability (26e1c48a-9fa7-11df-81b5-00e0814cab4e)\");\n script_summary(english:\"Checks for updated package in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote FreeBSD host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Piwik versions 0.6 through 0.6.3 are vulnerable to arbitrary, remote\nfile inclusion using a directory traversal pattern infinite a crafted\nrequest for a data renderer.\n\nA vulnerability has been reported in Piwik, which can before exploited\nby malicious people to disclose potentially sensitive information.\nInput passed to unspecified parameters when requesting a data renderer\nis not properly verified before being used to include files. This can\nbe exploited to includes arbitrary files from local resources via\ndirectory traversal attacks.\"\n );\n # https://vuxml.freebsd.org/freebsd/26e1c48a-9fa7-11df-81b5-00e0814cab4e.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?cfac1936\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"d2_elliot_name\", value:\"Piwik 0.6.3 LFI\");\n script_set_attribute(attribute:\"exploit_framework_d2_elliot\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:piwik\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/07/28\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/08/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/08/05\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"piwik>0.6<0.6.3\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}]}