Lucene search

K
openvasCopyright (C) 2010 Greenbone AGOPENVAS:1361412562310902066
HistoryJun 01, 2010 - 12:00 a.m.

Brekeke PBX CSRF Vulnerability

2010-06-0100:00:00
Copyright (C) 2010 Greenbone AG
plugins.openvas.org
8

2.6 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:N/I:P/A:N

6.7 Medium

AI Score

Confidence

Low

0.002 Low

EPSS

Percentile

52.0%

Brekeke PBX is prone to a cross-site request forgery (CSRF) vulnerability.

# SPDX-FileCopyrightText: 2010 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.902066");
  script_version("2024-06-28T05:05:33+0000");
  script_tag(name:"last_modification", value:"2024-06-28 05:05:33 +0000 (Fri, 28 Jun 2024)");
  script_tag(name:"creation_date", value:"2010-06-01 15:40:11 +0200 (Tue, 01 Jun 2010)");
  script_cve_id("CVE-2010-2114");
  script_tag(name:"cvss_base", value:"2.6");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:H/Au:N/C:N/I:P/A:N");
  script_name("Brekeke PBX CSRF Vulnerability");
  script_xref(name:"URL", value:"http://secunia.com/advisories/39952");
  script_xref(name:"URL", value:"http://cross-site-scripting.blogspot.com/2010/05/brekeke-pbx-2448-cross-site-request.html");

  script_category(ACT_GATHER_INFO);
  script_tag(name:"qod_type", value:"remote_banner");
  script_copyright("Copyright (C) 2010 Greenbone AG");
  script_family("Web application abuses");
  script_dependencies("find_service.nasl", "httpver.nasl", "global_settings.nasl");
  script_require_ports("Services/www", 28080);
  script_exclude_keys("Settings/disable_cgi_scanning");

  script_tag(name:"insight", value:"The flaw exists in the application which fails to perform
  validity checks on certain 'HTTP reqests', which allows an attacker to hijack
  the authentication of users for requests that change passwords via the
  pbxadmin.web.PbxUserEdit bean.");

  script_tag(name:"solution_type", value:"VendorFix");

  script_tag(name:"solution", value:"Upgrade to Brekeke PBX version 2.4.6.7 or later.");

  script_tag(name:"summary", value:"Brekeke PBX is prone to a cross-site request forgery (CSRF) vulnerability.");

  script_tag(name:"impact", value:"Successful exploitation will allow attackers to change the
  administrator's password by tricking a logged in administrator into visiting a
  malicious web site.");

  script_tag(name:"affected", value:"Brekeke PBX version 2.4.4.8.");

  exit(0);
}

include("http_func.inc");
include("port_service_func.inc");
include("version_func.inc");

port = http_get_port(default:28080);

req = http_get(item:string("/pbx/gate?bean=pbxadmin.web.PbxLogin"), port:port);
res = http_send_recv(port:port, data:req);

if(">Brekeke PBX<" >< res)
{
  version = eregmatch(pattern:"Version ([0-9.]+)" , string:res);
  if(version[1] != NULL)
  {
    if(version_is_less_equal(version:version[1], test_version:"2.4.4.8")){
      report = report_fixed_ver(installed_version:version[1], vulnerable_range:"Less or equal to 2.4.4.8");
      security_message(port:port, data:report);
    }
  }
}

2.6 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:N/I:P/A:N

6.7 Medium

AI Score

Confidence

Low

0.002 Low

EPSS

Percentile

52.0%

Related for OPENVAS:1361412562310902066