FreeBSD : OTRS -- Vulnerabilities in OTRS-Core allows read access to any file on local file system (86baa0d4-c997-11e0-8a8e-00151735203a)
2011-08-20T00:00:00
ID FREEBSD_PKG_86BAA0D4C99711E08A8E00151735203A.NASL Type nessus Reporter This script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof. Modified 2019-12-02T00:00:00
Description
OTRS Security Advisory reports :
An attacker with valid session and admin permissions could get read
access to any file on the servers local operating system. For this it
would be needed minimum one installed OTRS package.
#%NASL_MIN_LEVEL 80502
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from the FreeBSD VuXML database :
#
# Copyright 2003-2019 Jacques Vidrine and contributors
#
# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,
# HTML, PDF, PostScript, RTF and so forth) with or without modification,
# are permitted provided that the following conditions are met:
# 1. Redistributions of source code (VuXML) must retain the above
# copyright notice, this list of conditions and the following
# disclaimer as the first lines of this file unmodified.
# 2. Redistributions in compiled form (transformed to other DTDs,
# published online in any format, converted to PDF, PostScript,
# RTF and other formats) must reproduce the above copyright
# notice, this list of conditions and the following disclaimer
# in the documentation and/or other materials provided with the
# distribution.
#
# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS "AS IS"
# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS
# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT
# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,
# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
#
include("compat.inc");
if (description)
{
script_id(55914);
script_version("1.11");
script_cvs_date("Date: 2019/08/02 13:32:41");
script_cve_id("CVE-2011-2746");
script_name(english:"FreeBSD : OTRS -- Vulnerabilities in OTRS-Core allows read access to any file on local file system (86baa0d4-c997-11e0-8a8e-00151735203a)");
script_summary(english:"Checks for updated package in pkg_info output");
script_set_attribute(
attribute:"synopsis",
value:"The remote FreeBSD host is missing a security-related update."
);
script_set_attribute(
attribute:"description",
value:
"OTRS Security Advisory reports :
- An attacker with valid session and admin permissions could get read
access to any file on the servers local operating system. For this it
would be needed minimum one installed OTRS package."
);
# http://otrs.org/advisory/OSA-2011-03-en/
script_set_attribute(
attribute:"see_also",
value:"https://otrs.com"
);
# https://vuxml.freebsd.org/freebsd/86baa0d4-c997-11e0-8a8e-00151735203a.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?3b30ff6f"
);
script_set_attribute(attribute:"solution", value:"Update the affected package.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:P/I:N/A:N");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:otrs");
script_set_attribute(attribute:"cpe", value:"cpe:/o:freebsd:freebsd");
script_set_attribute(attribute:"vuln_publication_date", value:"2011/08/16");
script_set_attribute(attribute:"patch_publication_date", value:"2011/08/18");
script_set_attribute(attribute:"plugin_publication_date", value:"2011/08/20");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"FreeBSD Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/FreeBSD/release", "Host/FreeBSD/pkg_info");
exit(0);
}
include("audit.inc");
include("freebsd_package.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/FreeBSD/release")) audit(AUDIT_OS_NOT, "FreeBSD");
if (!get_kb_item("Host/FreeBSD/pkg_info")) audit(AUDIT_PACKAGE_LIST_MISSING);
flag = 0;
if (pkg_test(save_report:TRUE, pkg:"otrs>2.1.*<3.0.10")) flag++;
if (flag)
{
if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());
else security_warning(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
{"id": "FREEBSD_PKG_86BAA0D4C99711E08A8E00151735203A.NASL", "bulletinFamily": "scanner", "title": "FreeBSD : OTRS -- Vulnerabilities in OTRS-Core allows read access to any file on local file system (86baa0d4-c997-11e0-8a8e-00151735203a)", "description": "OTRS Security Advisory reports :\n\n- An attacker with valid session and admin permissions could get read\naccess to any file on the servers local operating system. For this it\nwould be needed minimum one installed OTRS package.", "published": "2011-08-20T00:00:00", "modified": "2019-12-02T00:00:00", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N"}, "href": "https://www.tenable.com/plugins/nessus/55914", "reporter": "This script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["https://otrs.com", "http://www.nessus.org/u?3b30ff6f"], "cvelist": ["CVE-2011-2746"], "type": "nessus", "lastseen": "2019-12-13T07:30:47", "history": [{"lastseen": "2019-01-16T20:12:27", "edition": 7, "differentElements": ["description"], "bulletin": {"lastseen": "2019-01-16T20:12:27", "references": ["https://otrs.com", "http://www.nessus.org/u?3b30ff6f"], "pluginID": "55914", "description": "OTRS Security Advisory reports :\n\n- An attacker with valid session and admin permissions could get read\naccess to any file on the servers local operating system. For this it\nwould be needed minimum one installed OTRS package.", "edition": 7, "reporter": "Tenable", "history": [], "published": "2011-08-20T00:00:00", "enchantments": {"score": {"vector": "NONE", "value": 2.1}, "dependencies": {"references": [{"idList": ["SUSE_11_3_OTRS-110905.NASL", "SUSE_11_4_OTRS-110905.NASL"], "type": "nessus"}, {"idList": ["OPENVAS:1361412562310103216", "OPENVAS:70260", "OPENVAS:136141256231070260"], "type": "openvas"}, {"idList": ["86BAA0D4-C997-11E0-8A8E-00151735203A"], "type": "freebsd"}, {"idList": ["CVE-2011-2746"], "type": "cve"}], "modified": "2019-01-16T20:12:27"}}, "title": "FreeBSD : OTRS -- Vulnerabilities in OTRS-Core allows read access to any file on local file system (86baa0d4-c997-11e0-8a8e-00151735203a)", "type": "nessus", "objectVersion": "1.3", "naslFamily": "FreeBSD Local Security Checks", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-2746"], "cpe": ["cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:otrs"], "modified": "2018-12-19T00:00:00", "href": "https://www.tenable.com/plugins/index.php?view=single&id=55914", "id": "FREEBSD_PKG_86BAA0D4C99711E08A8E00151735203A.NASL", "viewCount": 0, "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(55914);\n script_version(\"1.9\");\n script_cvs_date(\"Date: 2018/12/19 13:21:18\");\n\n script_cve_id(\"CVE-2011-2746\");\n\n script_name(english:\"FreeBSD : OTRS -- Vulnerabilities in OTRS-Core allows read access to any file on local file system (86baa0d4-c997-11e0-8a8e-00151735203a)\");\n script_summary(english:\"Checks for updated package in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote FreeBSD host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"OTRS Security Advisory reports :\n\n- An attacker with valid session and admin permissions could get read\naccess to any file on the servers local operating system. For this it\nwould be needed minimum one installed OTRS package.\"\n );\n # http://otrs.org/advisory/OSA-2011-03-en/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://otrs.com\"\n );\n # https://vuxml.freebsd.org/freebsd/86baa0d4-c997-11e0-8a8e-00151735203a.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?3b30ff6f\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:N/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:otrs\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2011/08/16\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/08/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/08/20\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"otrs>2.1.*<3.0.10\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.0, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:PARTIAL/I:NONE/A:NONE/"}, "hashmap": [{"hash": "fe45aa727b58c1249bf04cfb7b4e6ae0", "key": "naslFamily"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "d51ef32ed9f96cdaef2754a447c9af65", "key": "cvss"}, {"hash": "6d8000a975cdf5bed96d720a47e11f56", "key": "modified"}, {"hash": "d917a2ca42c47221bf918f7a4fa2e91d", "key": "published"}, {"hash": "818cdd667953a348a3d016040c271ce3", "key": "pluginID"}, {"hash": "5a3e0702b4a16bbee3dca53fea2232cd", "key": "cvelist"}, {"hash": "ae24f89e872004aaca59e54623c06f73", "key": "title"}, {"hash": "803b9489f1c48690d7b81e9f4bf9b303", "key": "cpe"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "2b00e6dc1b03cae7962f605d388d03c4", "key": "sourceData"}, {"hash": "6920c9747cdadb07d7308b301012e122", "key": "href"}, {"hash": "77427387834818cfaeeaa9d9f1ea3ed3", "key": "description"}, {"hash": "4c6b49de94e41760a51cb34871ed84e8", "key": "references"}], "hash": "b1bb99685e7b61579e4fdbeb8177a87476e0047e844c0c1e96e09995be32c956"}}, {"lastseen": "2018-11-13T17:09:29", "edition": 5, "differentElements": ["references", "modified", "sourceData"], "bulletin": {"lastseen": "2018-11-13T17:09:29", "references": ["http://otrs.org/advisory/OSA-2011-03-en/", "http://www.nessus.org/u?3b30ff6f"], "pluginID": "55914", "description": "OTRS Security Advisory reports :\n\n- An attacker with valid session and admin permissions could get read access to any file on the servers local operating system. For this it would be needed minimum one installed OTRS package.", "edition": 5, "reporter": "Tenable", "history": [], "published": "2011-08-20T00:00:00", "enchantments": {"score": {"vector": "NONE", "value": 2.1}}, "title": "FreeBSD : OTRS -- Vulnerabilities in OTRS-Core allows read access to any file on local file system (86baa0d4-c997-11e0-8a8e-00151735203a)", "type": "nessus", "objectVersion": "1.3", "naslFamily": "FreeBSD Local Security Checks", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-2746"], "cpe": ["cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:otrs"], "modified": "2018-11-10T00:00:00", "href": "https://www.tenable.com/plugins/index.php?view=single&id=55914", "id": "FREEBSD_PKG_86BAA0D4C99711E08A8E00151735203A.NASL", "viewCount": 0, "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(55914);\n script_version(\"1.8\");\n script_cvs_date(\"Date: 2018/11/10 11:49:42\");\n\n script_cve_id(\"CVE-2011-2746\");\n\n script_name(english:\"FreeBSD : OTRS -- Vulnerabilities in OTRS-Core allows read access to any file on local file system (86baa0d4-c997-11e0-8a8e-00151735203a)\");\n script_summary(english:\"Checks for updated package in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote FreeBSD host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"OTRS Security Advisory reports :\n\n- An attacker with valid session and admin permissions could get read\naccess to any file on the servers local operating system. For this it\nwould be needed minimum one installed OTRS package.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://otrs.org/advisory/OSA-2011-03-en/\"\n );\n # https://vuxml.freebsd.org/freebsd/86baa0d4-c997-11e0-8a8e-00151735203a.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?3b30ff6f\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:N/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:otrs\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2011/08/16\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/08/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/08/20\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"otrs>2.1.*<3.0.10\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.0, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:PARTIAL/I:NONE/A:NONE/"}, "hashmap": [{"hash": "fe45aa727b58c1249bf04cfb7b4e6ae0", "key": "naslFamily"}, {"hash": "231e1ec415a3e3c4dbbc726617a1e552", "key": "sourceData"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "d51ef32ed9f96cdaef2754a447c9af65", "key": "cvss"}, {"hash": "d917a2ca42c47221bf918f7a4fa2e91d", "key": "published"}, {"hash": "818cdd667953a348a3d016040c271ce3", "key": "pluginID"}, {"hash": "5a3e0702b4a16bbee3dca53fea2232cd", "key": "cvelist"}, {"hash": "7cbfe42724d307a9218a26ca666630aa", "key": "description"}, {"hash": "ae24f89e872004aaca59e54623c06f73", "key": "title"}, {"hash": "803b9489f1c48690d7b81e9f4bf9b303", "key": "cpe"}, {"hash": "363cf4b4acd2ee5726b5d718e34d7fba", "key": "references"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "3c764d4cf584f9ded7aa4dcca57c78ff", "key": "modified"}, {"hash": "6920c9747cdadb07d7308b301012e122", "key": "href"}], "hash": "2dd8b982ba05ca1e19cc9e91bd3d19433abbb0f19c31a45f318488506cde1539"}}, {"lastseen": "2019-11-01T02:38:58", "edition": 10, "differentElements": ["modified"], "bulletin": {"lastseen": "2019-11-01T02:38:58", "references": ["https://otrs.com", "http://www.nessus.org/u?3b30ff6f"], "pluginID": "55914", "description": "OTRS Security Advisory reports :\n\n- An attacker with valid session and admin permissions could get read\naccess to any file on the servers local operating system. For this it\nwould be needed minimum one installed OTRS package.", "edition": 10, "reporter": "This script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.", "history": [], "published": "2011-08-20T00:00:00", "enchantments": {"score": {"modified": "2019-11-01T02:38:58", "vector": "NONE", "value": 4.5}, "dependencies": {"references": [{"idList": ["SUSE_11_3_OTRS-110905.NASL", "SUSE_11_4_OTRS-110905.NASL"], "type": "nessus"}, {"idList": ["OPENVAS:1361412562310103216", "OPENVAS:70260", "OPENVAS:136141256231070260"], "type": "openvas"}, {"idList": ["86BAA0D4-C997-11E0-8A8E-00151735203A"], "type": "freebsd"}, {"idList": ["CVE-2011-2746"], "type": "cve"}], "modified": "2019-11-01T02:38:58"}}, "title": "FreeBSD : OTRS -- Vulnerabilities in OTRS-Core allows read access to any file on local file system (86baa0d4-c997-11e0-8a8e-00151735203a)", "type": "nessus", "objectVersion": "1.3", "naslFamily": "FreeBSD Local Security Checks", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-2746"], "cpe": ["cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:otrs"], "modified": "2019-11-02T00:00:00", "href": "https://www.tenable.com/plugins/nessus/55914", "id": "FREEBSD_PKG_86BAA0D4C99711E08A8E00151735203A.NASL", "viewCount": 0, "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2019 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(55914);\n script_version(\"1.11\");\n script_cvs_date(\"Date: 2019/08/02 13:32:41\");\n\n script_cve_id(\"CVE-2011-2746\");\n\n script_name(english:\"FreeBSD : OTRS -- Vulnerabilities in OTRS-Core allows read access to any file on local file system (86baa0d4-c997-11e0-8a8e-00151735203a)\");\n script_summary(english:\"Checks for updated package in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote FreeBSD host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"OTRS Security Advisory reports :\n\n- An attacker with valid session and admin permissions could get read\naccess to any file on the servers local operating system. For this it\nwould be needed minimum one installed OTRS package.\"\n );\n # http://otrs.org/advisory/OSA-2011-03-en/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://otrs.com\"\n );\n # https://vuxml.freebsd.org/freebsd/86baa0d4-c997-11e0-8a8e-00151735203a.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?3b30ff6f\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:N/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:otrs\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2011/08/16\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/08/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/08/20\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"otrs>2.1.*<3.0.10\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N"}, "hashmap": [{"hash": "fe45aa727b58c1249bf04cfb7b4e6ae0", "key": "naslFamily"}, {"hash": "abcf9266f425f12dda38f529cd4a94bc", "key": "modified"}, {"hash": "940ea861ca17b410c27dae10f10b7adb", "key": "reporter"}, {"hash": "780630e5ec68d2c0bcb61ae7dfab95ac", "key": "sourceData"}, {"hash": "d917a2ca42c47221bf918f7a4fa2e91d", "key": "published"}, {"hash": "818cdd667953a348a3d016040c271ce3", "key": "pluginID"}, {"hash": "5a3e0702b4a16bbee3dca53fea2232cd", "key": "cvelist"}, {"hash": "6cd33ffd73a049b85c09b77d4d4e7b81", "key": "href"}, {"hash": "ae24f89e872004aaca59e54623c06f73", "key": "title"}, {"hash": "803b9489f1c48690d7b81e9f4bf9b303", "key": "cpe"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "e258b79b31d39a327c9dafeb61b7a729", "key": "cvss"}, {"hash": "77427387834818cfaeeaa9d9f1ea3ed3", "key": "description"}, {"hash": "4c6b49de94e41760a51cb34871ed84e8", "key": "references"}], "hash": "1baced06e9293acb3571843ee7bfcb0177b09ed4ec592a8adf87dd3eff2c528b"}}, {"lastseen": "2019-10-28T20:22:35", "edition": 9, "differentElements": ["modified"], "bulletin": {"lastseen": "2019-10-28T20:22:35", "references": ["https://otrs.com", "http://www.nessus.org/u?3b30ff6f"], "pluginID": "55914", "description": "OTRS Security Advisory reports :\n\n- An attacker with valid session and admin permissions could get read\naccess to any file on the servers local operating system. For this it\nwould be needed minimum one installed OTRS package.", "edition": 9, "reporter": "This script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.", "history": [], "published": "2011-08-20T00:00:00", "enchantments": {"score": {"modified": "2019-10-28T20:22:35", "vector": "NONE", "value": 4.5}, "dependencies": {"references": [{"idList": ["SUSE_11_3_OTRS-110905.NASL", "SUSE_11_4_OTRS-110905.NASL"], "type": "nessus"}, {"idList": ["OPENVAS:1361412562310103216", "OPENVAS:70260", "OPENVAS:136141256231070260"], "type": "openvas"}, {"idList": ["86BAA0D4-C997-11E0-8A8E-00151735203A"], "type": "freebsd"}, {"idList": ["CVE-2011-2746"], "type": "cve"}], "modified": "2019-10-28T20:22:35"}}, "title": "FreeBSD : OTRS -- Vulnerabilities in OTRS-Core allows read access to any file on local file system (86baa0d4-c997-11e0-8a8e-00151735203a)", "type": "nessus", "objectVersion": "1.3", "naslFamily": "FreeBSD Local Security Checks", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-2746"], "cpe": ["cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:otrs"], "modified": "2019-10-02T00:00:00", "href": "https://www.tenable.com/plugins/nessus/55914", "id": "FREEBSD_PKG_86BAA0D4C99711E08A8E00151735203A.NASL", "viewCount": 0, "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2019 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(55914);\n script_version(\"1.11\");\n script_cvs_date(\"Date: 2019/08/02 13:32:41\");\n\n script_cve_id(\"CVE-2011-2746\");\n\n script_name(english:\"FreeBSD : OTRS -- Vulnerabilities in OTRS-Core allows read access to any file on local file system (86baa0d4-c997-11e0-8a8e-00151735203a)\");\n script_summary(english:\"Checks for updated package in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote FreeBSD host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"OTRS Security Advisory reports :\n\n- An attacker with valid session and admin permissions could get read\naccess to any file on the servers local operating system. For this it\nwould be needed minimum one installed OTRS package.\"\n );\n # http://otrs.org/advisory/OSA-2011-03-en/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://otrs.com\"\n );\n # https://vuxml.freebsd.org/freebsd/86baa0d4-c997-11e0-8a8e-00151735203a.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?3b30ff6f\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:N/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:otrs\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2011/08/16\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/08/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/08/20\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"otrs>2.1.*<3.0.10\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N"}, "hashmap": [{"hash": "fe45aa727b58c1249bf04cfb7b4e6ae0", "key": "naslFamily"}, {"hash": "940ea861ca17b410c27dae10f10b7adb", "key": "reporter"}, {"hash": "780630e5ec68d2c0bcb61ae7dfab95ac", "key": "sourceData"}, {"hash": "d917a2ca42c47221bf918f7a4fa2e91d", "key": "published"}, {"hash": "818cdd667953a348a3d016040c271ce3", "key": "pluginID"}, {"hash": "5a3e0702b4a16bbee3dca53fea2232cd", "key": "cvelist"}, {"hash": "6cd33ffd73a049b85c09b77d4d4e7b81", "key": "href"}, {"hash": "ae24f89e872004aaca59e54623c06f73", "key": "title"}, {"hash": "803b9489f1c48690d7b81e9f4bf9b303", "key": "cpe"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "0bafb6325bcaf483a25404f785191cc5", "key": "modified"}, {"hash": "e258b79b31d39a327c9dafeb61b7a729", "key": "cvss"}, {"hash": "77427387834818cfaeeaa9d9f1ea3ed3", "key": "description"}, {"hash": "4c6b49de94e41760a51cb34871ed84e8", "key": "references"}], "hash": "48f60ce1673fbff6266f490dcf089443d01bc515aa46c4ac8f255f8683165481"}}, {"lastseen": "2019-02-21T01:15:17", "edition": 8, "differentElements": ["cvss", "description", "reporter", "modified", "sourceData", "href"], "bulletin": {"lastseen": "2019-02-21T01:15:17", "references": ["https://otrs.com", "http://www.nessus.org/u?3b30ff6f"], "pluginID": "55914", "description": "OTRS Security Advisory reports :\n\n- An attacker with valid session and admin permissions could get read access to any file on the servers local operating system. For this it would be needed minimum one installed OTRS package.", "edition": 8, "reporter": "Tenable", "history": [], "published": "2011-08-20T00:00:00", "enchantments": {"score": {"modified": "2019-02-21T01:15:17", "vector": "NONE", "value": 4.6}, "dependencies": {"references": [{"idList": ["SUSE_11_3_OTRS-110905.NASL", "SUSE_11_4_OTRS-110905.NASL"], "type": "nessus"}, {"idList": ["OPENVAS:1361412562310103216", "OPENVAS:70260", "OPENVAS:136141256231070260"], "type": "openvas"}, {"idList": ["86BAA0D4-C997-11E0-8A8E-00151735203A"], "type": "freebsd"}, {"idList": ["CVE-2011-2746"], "type": "cve"}], "modified": "2019-02-21T01:15:17"}}, "title": "FreeBSD : OTRS -- Vulnerabilities in OTRS-Core allows read access to any file on local file system (86baa0d4-c997-11e0-8a8e-00151735203a)", "type": "nessus", "objectVersion": "1.3", "naslFamily": "FreeBSD Local Security Checks", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-2746"], "cpe": ["cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:otrs"], "modified": "2018-12-19T00:00:00", "href": "https://www.tenable.com/plugins/index.php?view=single&id=55914", "id": "FREEBSD_PKG_86BAA0D4C99711E08A8E00151735203A.NASL", "viewCount": 0, "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(55914);\n script_version(\"1.9\");\n script_cvs_date(\"Date: 2018/12/19 13:21:18\");\n\n script_cve_id(\"CVE-2011-2746\");\n\n script_name(english:\"FreeBSD : OTRS -- Vulnerabilities in OTRS-Core allows read access to any file on local file system (86baa0d4-c997-11e0-8a8e-00151735203a)\");\n script_summary(english:\"Checks for updated package in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote FreeBSD host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"OTRS Security Advisory reports :\n\n- An attacker with valid session and admin permissions could get read\naccess to any file on the servers local operating system. For this it\nwould be needed minimum one installed OTRS package.\"\n );\n # http://otrs.org/advisory/OSA-2011-03-en/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://otrs.com\"\n );\n # https://vuxml.freebsd.org/freebsd/86baa0d4-c997-11e0-8a8e-00151735203a.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?3b30ff6f\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:N/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:otrs\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2011/08/16\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/08/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/08/20\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"otrs>2.1.*<3.0.10\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.0, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:PARTIAL/I:NONE/A:NONE/"}, "hashmap": [{"hash": "fe45aa727b58c1249bf04cfb7b4e6ae0", "key": "naslFamily"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "d51ef32ed9f96cdaef2754a447c9af65", "key": "cvss"}, {"hash": "6d8000a975cdf5bed96d720a47e11f56", "key": "modified"}, {"hash": "d917a2ca42c47221bf918f7a4fa2e91d", "key": "published"}, {"hash": "818cdd667953a348a3d016040c271ce3", "key": "pluginID"}, {"hash": "5a3e0702b4a16bbee3dca53fea2232cd", "key": "cvelist"}, {"hash": "7cbfe42724d307a9218a26ca666630aa", "key": "description"}, {"hash": "ae24f89e872004aaca59e54623c06f73", "key": "title"}, {"hash": "803b9489f1c48690d7b81e9f4bf9b303", "key": "cpe"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "2b00e6dc1b03cae7962f605d388d03c4", "key": "sourceData"}, {"hash": "6920c9747cdadb07d7308b301012e122", "key": "href"}, {"hash": "4c6b49de94e41760a51cb34871ed84e8", "key": "references"}], "hash": "c0574c7187a015cc4ae3abef3e0f58baca2cc82371426ad8984903813e584d36"}}], "edition": 11, "hashmap": [{"key": "bulletinFamily", "hash": "bbdaea376f500d25f6b0c1050311dd07"}, {"key": "cpe", "hash": "803b9489f1c48690d7b81e9f4bf9b303"}, {"key": "cvelist", "hash": "5a3e0702b4a16bbee3dca53fea2232cd"}, {"key": "cvss", "hash": "e258b79b31d39a327c9dafeb61b7a729"}, {"key": "description", "hash": "77427387834818cfaeeaa9d9f1ea3ed3"}, {"key": "href", "hash": "6cd33ffd73a049b85c09b77d4d4e7b81"}, {"key": "modified", "hash": "5a7504dfe859a7ccbaf560628f6442ad"}, {"key": "naslFamily", "hash": "fe45aa727b58c1249bf04cfb7b4e6ae0"}, {"key": "pluginID", "hash": "818cdd667953a348a3d016040c271ce3"}, {"key": "published", "hash": "d917a2ca42c47221bf918f7a4fa2e91d"}, {"key": "references", "hash": "4c6b49de94e41760a51cb34871ed84e8"}, {"key": "reporter", "hash": "940ea861ca17b410c27dae10f10b7adb"}, {"key": "sourceData", "hash": "780630e5ec68d2c0bcb61ae7dfab95ac"}, {"key": "title", "hash": "ae24f89e872004aaca59e54623c06f73"}, {"key": "type", "hash": "5e0bd03bec244039678f2b955a2595aa"}], "hash": "e09e91f67e514f0d99e9a495fdf824ccd54bfaf3371c9fd585ed46a3e59579b7", "viewCount": 0, "enchantments": {"dependencies": {"references": [{"idList": ["SUSE_11_3_OTRS-110905.NASL", "SUSE_11_4_OTRS-110905.NASL"], "type": "nessus"}, {"idList": ["OPENVAS:1361412562310103216", "OPENVAS:70260", "OPENVAS:136141256231070260"], "type": "openvas"}, {"idList": ["86BAA0D4-C997-11E0-8A8E-00151735203A"], "type": "freebsd"}, {"idList": ["CVE-2011-2746"], "type": "cve"}], "modified": "2019-11-01T02:38:58"}, "score": {"value": 4.5, "vector": "NONE", "modified": "2019-11-01T02:38:58"}, "vulnersScore": 4.5}, "objectVersion": "1.3", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2019 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(55914);\n script_version(\"1.11\");\n script_cvs_date(\"Date: 2019/08/02 13:32:41\");\n\n script_cve_id(\"CVE-2011-2746\");\n\n script_name(english:\"FreeBSD : OTRS -- Vulnerabilities in OTRS-Core allows read access to any file on local file system (86baa0d4-c997-11e0-8a8e-00151735203a)\");\n script_summary(english:\"Checks for updated package in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote FreeBSD host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"OTRS Security Advisory reports :\n\n- An attacker with valid session and admin permissions could get read\naccess to any file on the servers local operating system. For this it\nwould be needed minimum one installed OTRS package.\"\n );\n # http://otrs.org/advisory/OSA-2011-03-en/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://otrs.com\"\n );\n # https://vuxml.freebsd.org/freebsd/86baa0d4-c997-11e0-8a8e-00151735203a.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?3b30ff6f\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:N/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:otrs\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2011/08/16\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/08/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/08/20\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"otrs>2.1.*<3.0.10\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "naslFamily": "FreeBSD Local Security Checks", "pluginID": "55914", "cpe": ["cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:otrs"], "scheme": null}
{"cve": [{"lastseen": "2019-05-29T18:11:13", "bulletinFamily": "NVD", "description": "Unspecified vulnerability in Kernel/Modules/AdminPackageManager.pm in OTRS-Core in Open Ticket Request System (OTRS) 2.x before 2.4.11 and 3.x before 3.0.10 allows remote authenticated administrators to read arbitrary files via unknown vectors.", "modified": "2011-09-23T03:34:00", "id": "CVE-2011-2746", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-2746", "published": "2011-08-29T15:55:00", "title": "CVE-2011-2746", "type": "cve", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N"}}], "freebsd": [{"lastseen": "2019-05-29T18:33:57", "bulletinFamily": "unix", "description": "\nOTRS Security Advisory reports:\n\n\nAn attacker with valid session and admin permissions could\n\t get read access to any file on the servers local operating\n\t system. For this it would be needed minimum one installed\n\t OTRS package.\n\n\n", "modified": "2011-08-16T00:00:00", "published": "2011-08-16T00:00:00", "id": "86BAA0D4-C997-11E0-8A8E-00151735203A", "href": "https://vuxml.freebsd.org/freebsd/86baa0d4-c997-11e0-8a8e-00151735203a.html", "title": "OTRS -- Vulnerabilities in OTRS-Core allows read access to any file on local file system", "type": "freebsd", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N"}}], "openvas": [{"lastseen": "2017-07-02T21:13:45", "bulletinFamily": "scanner", "description": "The remote host is missing an update to the system\nas announced in the referenced advisory.", "modified": "2017-02-25T00:00:00", "published": "2011-09-21T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=70260", "id": "OPENVAS:70260", "title": "FreeBSD Ports: otrs", "type": "openvas", "sourceData": "#\n#VID 86baa0d4-c997-11e0-8a8e-00151735203a\n# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from VID 86baa0d4-c997-11e0-8a8e-00151735203a\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The following package is affected: otrs\n\nCVE-2011-2746\nUnspecified vulnerability in Kernel/Modules/AdminPackageManager.pm in\nOTRS-Core in Open Ticket Request System (OTRS) 2.x before 2.4.11 and\n3.x before 3.0.10 allows remote authenticated administrators to read\narbitrary files via unknown vectors.\";\ntag_solution = \"Update your system with the appropriate patches or\nsoftware upgrades.\n\nhttp://otrs.org/advisory/OSA-2011-03-en/\nhttp://www.vuxml.org/freebsd/86baa0d4-c997-11e0-8a8e-00151735203a.html\";\ntag_summary = \"The remote host is missing an update to the system\nas announced in the referenced advisory.\";\n\n\n\nif(description)\n{\n script_id(70260);\n script_version(\"$Revision: 5424 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-02-25 17:52:36 +0100 (Sat, 25 Feb 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-09-21 05:47:11 +0200 (Wed, 21 Sep 2011)\");\n script_tag(name:\"cvss_base\", value:\"4.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:P/I:N/A:N\");\n script_cve_id(\"CVE-2011-2746\");\n script_name(\"FreeBSD Ports: otrs\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"FreeBSD Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/freebsdrel\", \"login/SSH/success\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-bsd.inc\");\n\ntxt = \"\";\nvuln = 0;\nbver = portver(pkg:\"otrs\");\nif(!isnull(bver) && revcomp(a:bver, b:\"2.1\")>0 && revcomp(a:bver, b:\"3.0.10\")<0) {\n txt += 'Package otrs version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\n\nif(vuln) {\n security_message(data:string(txt));\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 4.0, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:PARTIAL/I:NONE/A:NONE/"}}, {"lastseen": "2019-05-29T18:40:00", "bulletinFamily": "scanner", "description": "OTRS is prone to a local file-disclosure vulnerability", "modified": "2018-10-20T00:00:00", "published": "2011-08-22T00:00:00", "id": "OPENVAS:1361412562310103216", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310103216", "title": "OTRS 'AdminPackageManager.pm' Local File Disclosure Vulnerability", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_otrs_49251.nasl 11997 2018-10-20 11:59:41Z mmartin $\n#\n# OTRS 'AdminPackageManager.pm' Local File Disclosure Vulnerability\n#\n# Authors:\n# Michael Meyer <michael.meyer@greenbone.net>\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\nCPE = \"cpe:/a:otrs:otrs\";\n\n\nif (description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.103216\");\n script_version(\"$Revision: 11997 $\");\n script_cve_id(\"CVE-2011-2746\");\n script_bugtraq_id(49251);\n script_tag(name:\"cvss_base\", value:\"4.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:P/I:N/A:N\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-20 13:59:41 +0200 (Sat, 20 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2011-08-22 16:04:33 +0200 (Mon, 22 Aug 2011)\");\n script_name(\"OTRS 'AdminPackageManager.pm' Local File Disclosure Vulnerability\");\n\n\n script_tag(name:\"impact\", value:\"Exploiting this vulnerability would allow an attacker to obtain potentially\nsensitive information from local files on computers running the vulnerable\napplication. This may aid in further attacks.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"An error exists in application which fails to adequately validate\nuser-supplied input.\");\n script_tag(name:\"solution\", value:\"Updates are available. Please see the references for more information.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"OTRS is prone to a local file-disclosure vulnerability\");\n script_tag(name:\"affected\", value:\"Open Ticket Request System (OTRS) version 2.4.x before 2.4.11 and 3.x before 3.0.8\");\n\n script_tag(name:\"qod_type\", value:\"remote_banner\");\n script_xref(name:\"URL\", value:\"http://www.securityfocus.com/bid/49251\");\n script_xref(name:\"URL\", value:\"http://otrs.org/\");\n script_xref(name:\"URL\", value:\"http://otrs.org/advisory/OSA-2011-03-en/\");\n script_category(ACT_GATHER_INFO);\n script_family(\"Web application abuses\");\n script_copyright(\"This script is Copyright (C) 2011 Greenbone Networks GmbH\");\n script_dependencies(\"secpod_otrs_detect.nasl\");\n script_require_ports(\"Services/www\", 80);\n script_mandatory_keys(\"OTRS/installed\");\n exit(0);\n}\n\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nif(!port = get_app_port(cpe:CPE)){\n exit(0);\n}\n\nif(vers = get_app_version(cpe:CPE, port:port))\n{\n if(version_in_range(version: vers, test_version:\"2.4\", test_version2:\"2.4.10\") ||\n version_in_range(version: vers, test_version:\"3.0\", test_version2:\"3.0.7\"))\n {\n security_message(port:port);\n exit(0);\n }\n\n}\n\nexit(0);\n", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N"}}, {"lastseen": "2019-05-29T18:39:42", "bulletinFamily": "scanner", "description": "The remote host is missing an update to the system\n as announced in the referenced advisory.", "modified": "2018-10-05T00:00:00", "published": "2011-09-21T00:00:00", "id": "OPENVAS:136141256231070260", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231070260", "title": "FreeBSD Ports: otrs", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: freebsd_otrs2.nasl 11762 2018-10-05 10:54:12Z cfischer $\n#\n# Auto generated from VID 86baa0d4-c997-11e0-8a8e-00151735203a\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.70260\");\n script_version(\"$Revision: 11762 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-05 12:54:12 +0200 (Fri, 05 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2011-09-21 05:47:11 +0200 (Wed, 21 Sep 2011)\");\n script_tag(name:\"cvss_base\", value:\"4.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:P/I:N/A:N\");\n script_cve_id(\"CVE-2011-2746\");\n script_name(\"FreeBSD Ports: otrs\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"FreeBSD Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/freebsd\", \"ssh/login/freebsdrel\");\n\n script_tag(name:\"insight\", value:\"The following package is affected: otrs\n\nCVE-2011-2746\nUnspecified vulnerability in Kernel/Modules/AdminPackageManager.pm in\nOTRS-Core in Open Ticket Request System (OTRS) 2.x before 2.4.11 and\n3.x before 3.0.10 allows remote authenticated administrators to read\narbitrary files via unknown vectors.\");\n\n script_tag(name:\"solution\", value:\"Update your system with the appropriate patches or\n software upgrades.\");\n\n script_xref(name:\"URL\", value:\"http://otrs.org/advisory/OSA-2011-03-en/\");\n script_xref(name:\"URL\", value:\"http://www.vuxml.org/freebsd/86baa0d4-c997-11e0-8a8e-00151735203a.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update to the system\n as announced in the referenced advisory.\");\n\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-bsd.inc\");\n\nvuln = FALSE;\ntxt = \"\";\n\nbver = portver(pkg:\"otrs\");\nif(!isnull(bver) && revcomp(a:bver, b:\"2.1\")>0 && revcomp(a:bver, b:\"3.0.10\")<0) {\n txt += 'Package otrs version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = TRUE;\n}\n\nif(vuln) {\n security_message(data:txt);\n} else if (__pkg_match) {\n exit(99);\n}", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N"}}], "nessus": [{"lastseen": "2019-12-13T09:21:10", "bulletinFamily": "scanner", "description": "OTRS administrators may read arbitrary local files (CVE-2011-2746).\nOTRS was updated to version 2.4.11 which fixes the issue.", "modified": "2019-12-02T00:00:00", "id": "SUSE_11_4_OTRS-110905.NASL", "href": "https://www.tenable.com/plugins/nessus/75990", "published": "2014-06-13T00:00:00", "title": "openSUSE Security Update : otrs (openSUSE-SU-2011:1017-1)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update otrs-5098.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(75990);\n script_version(\"1.5\");\n script_cvs_date(\"Date: 2019/10/25 13:36:42\");\n\n script_cve_id(\"CVE-2011-2746\");\n\n script_name(english:\"openSUSE Security Update : otrs (openSUSE-SU-2011:1017-1)\");\n script_summary(english:\"Check for the otrs-5098 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"OTRS administrators may read arbitrary local files (CVE-2011-2746).\nOTRS was updated to version 2.4.11 which fixes the issue.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=715659\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.opensuse.org/opensuse-updates/2011-09/msg00011.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected otrs packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:N/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:otrs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:otrs-itsm\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:11.4\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/09/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/06/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE11\\.4)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"11.4\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE11.4\", reference:\"otrs-2.4.11-0.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.4\", reference:\"otrs-itsm-2.1.4-0.7.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"otrs / otrs-itsm\");\n}\n", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N"}}, {"lastseen": "2019-12-13T09:21:06", "bulletinFamily": "scanner", "description": "OTRS administrators may read arbitrary local files (CVE-2011-2746).\nOTRS was updated to version 2.4.11 which fixes the issue.", "modified": "2019-12-02T00:00:00", "id": "SUSE_11_3_OTRS-110905.NASL", "href": "https://www.tenable.com/plugins/nessus/75703", "published": "2014-06-13T00:00:00", "title": "openSUSE Security Update : otrs (openSUSE-SU-2011:1017-1)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update otrs-5098.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(75703);\n script_version(\"1.5\");\n script_cvs_date(\"Date: 2019/10/25 13:36:41\");\n\n script_cve_id(\"CVE-2011-2746\");\n\n script_name(english:\"openSUSE Security Update : otrs (openSUSE-SU-2011:1017-1)\");\n script_summary(english:\"Check for the otrs-5098 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"OTRS administrators may read arbitrary local files (CVE-2011-2746).\nOTRS was updated to version 2.4.11 which fixes the issue.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=715659\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.opensuse.org/opensuse-updates/2011-09/msg00011.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected otrs packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:N/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:otrs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:otrs-itsm\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:11.3\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/09/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/06/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE11\\.3)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"11.3\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE11.3\", reference:\"otrs-2.4.11-0.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"otrs-itsm-2.1.4-0.7.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"otrs / otrs-itsm\");\n}\n", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N"}}]}