The remote host is missing an update for the Debian 'interchange' package(s) announced via the DSA-471 advisory. A vulnerability was discovered in Interchange, an e-commerce and general HTTP database display system, allowing an attacker to expose the content of arbitrary variables
Reporter | Title | Published | Views | Family All 9 |
---|---|---|---|---|
![]() | [SECURITY] [DSA 471-1] New interchange packages fix information leak | 2 Apr 200416:51 | – | debian |
![]() | [SECURITY] [DSA 471-1] New interchange packages fix information leak | 2 Apr 200416:51 | – | debian |
![]() | CVE-2004-0374 | 6 Apr 200404:00 | – | cvelist |
![]() | [SECURITY] [DSA 471-1] New interchange packages fix information leak | 3 Apr 200400:00 | – | securityvulns |
![]() | Debian Security Advisory DSA 471-1 (interchange) | 17 Jan 200800:00 | – | openvas |
![]() | interchange - missing input sanitising | 2 Apr 200400:00 | – | osv |
![]() | Debian DSA-471-1 : interchange - missing input sanitising | 29 Sep 200400:00 | – | nessus |
![]() | CVE-2004-0374 | 4 May 200404:00 | – | cve |
![]() | CVE-2004-0374 | 4 May 200404:00 | – | nvd |
Source | Link |
---|---|
security-tracker | www.security-tracker.debian.org/tracker/DSA-471 |
debian | www.debian.org/security/2004/DSA-471 |
# SPDX-FileCopyrightText: 2008 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.53168");
script_cve_id("CVE-2004-0374");
script_tag(name:"creation_date", value:"2008-01-17 21:41:51 +0000 (Thu, 17 Jan 2008)");
script_version("2024-02-01T14:37:10+0000");
script_tag(name:"last_modification", value:"2024-02-01 14:37:10 +0000 (Thu, 01 Feb 2024)");
script_tag(name:"cvss_base", value:"6.4");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:N");
script_name("Debian: Security Advisory (DSA-471)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2008 Greenbone AG");
script_family("Debian Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/debian_linux", "ssh/login/packages", re:"ssh/login/release=DEB3\.0");
script_xref(name:"Advisory-ID", value:"DSA-471");
script_xref(name:"URL", value:"https://www.debian.org/security/2004/DSA-471");
script_xref(name:"URL", value:"https://security-tracker.debian.org/tracker/DSA-471");
script_tag(name:"summary", value:"The remote host is missing an update for the Debian 'interchange' package(s) announced via the DSA-471 advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");
script_tag(name:"insight", value:"A vulnerability was discovered recently in Interchange, an e-commerce and general HTTP database display system. This vulnerability can be exploited by an attacker to expose the content of arbitrary variables. An attacker may learn SQL access information for your Interchange application and use this information to read and manipulate sensitive data.
For the stable distribution (woody) this problem has been fixed in version 4.8.3.20020306-1.woody.2.
For the unstable distribution (sid) this problem has been fixed in version 5.0.1-1.
We recommend that you upgrade your interchange package.");
script_tag(name:"affected", value:"'interchange' package(s) on Debian 3.0.");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"package");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-deb.inc");
release = dpkg_get_ssh_release();
if(!release)
exit(0);
res = "";
report = "";
if(release == "DEB3.0") {
if(!isnull(res = isdpkgvuln(pkg:"interchange", ver:"4.8.3.20020306-1.woody.2", rls:"DEB3.0"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"interchange-cat-foundation", ver:"4.8.3.20020306-1.woody.2", rls:"DEB3.0"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"interchange-ui", ver:"4.8.3.20020306-1.woody.2", rls:"DEB3.0"))) {
report += res;
}
if(!isnull(res = isdpkgvuln(pkg:"libapache-mod-interchange", ver:"4.8.3.20020306-1.woody.2", rls:"DEB3.0"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
exit(0);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo