ID 5086.PRM Type nessus Reporter Tenable Modified 2019-03-06T00:00:00
Description
The remote host is running BASE, a web-based tool for analyzing alerts from one or more SNORT sensors. The version of BASE installed on the remote host is earlier than 1.2.5. Such versions are reportedly fail to sufficiently validate 'user', 'role', or passwords against the database in the 'readRoleCookie()' function of the 'includes/base_auth.inc/php' script. An attacker could exploit this in order to bypass authentication and gain unauthorized access to the application.
Binary data 5086.prm
{"id": "5086.PRM", "type": "nessus", "bulletinFamily": "scanner", "title": "BASE < 1.2.5 Authentication Bypass", "description": "The remote host is running BASE, a web-based tool for analyzing alerts from one or more SNORT sensors. The version of BASE installed on the remote host is earlier than 1.2.5. Such versions are reportedly fail to sufficiently validate 'user', 'role', or passwords against the database in the 'readRoleCookie()' function of the 'includes/base_auth.inc/php' script. An attacker could exploit this in order to bypass authentication and gain unauthorized access to the application.", "published": "2004-08-18T00:00:00", "modified": "2019-03-06T00:00:00", "cvss": {"score": 7.5, "vector": "CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cvss2": {}, "cvss3": {"score": 7.3, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}, "href": "https://www.tenable.com/plugins/nnm/5086", "reporter": "Tenable", "references": ["http://www.securityfocus.com/archive/1/504487/30/0/threaded"], "cvelist": [], "immutableFields": [], "lastseen": "2021-08-19T13:19:29", "viewCount": 0, "enchantments": {"dependencies": {}, "score": {"value": 2.7, "vector": "NONE"}, "backreferences": {}, "exploitation": null, "vulnersScore": 2.7}, "pluginID": "5086", "sourceData": "Binary data 5086.prm", "naslFamily": "CGI", "cpe": [], "solution": "Upgrade to BASE version 1.2.5", "nessusSeverity": "High", "cvssScoreSource": "", "vpr": {}, "exploitAvailable": false, "exploitEase": "", "patchPublicationDate": null, "vulnerabilityPublicationDate": null, "exploitableWith": [], "_state": {"dependencies": 1645998211}}