ID USN-1249-1 Type ubuntu Reporter Ubuntu Modified 2011-10-27T00:00:00
Description
It was discovered that BackupPC did not properly sanitize its input when
processing backup browser error messages, resulting in a cross-site
scripting (XSS) vulnerability. With cross-site scripting vulnerabilities,
if a user were tricked into viewing server output during a crafted server
request, a remote attacker could exploit this to modify the contents, or
steal confidential data, within the same domain. This issue did not affect
Ubuntu 11.10. (CVE-2011-3361)
Jamie Strandboge discovered that BackupPC did not properly sanitize its
input when processing log file viewer error messages, resulting in
cross-site scripting (XSS) vulnerabilities.
{"id": "USN-1249-1", "bulletinFamily": "unix", "title": "BackupPC vulnerabilities", "description": "It was discovered that BackupPC did not properly sanitize its input when \nprocessing backup browser error messages, resulting in a cross-site \nscripting (XSS) vulnerability. With cross-site scripting vulnerabilities, \nif a user were tricked into viewing server output during a crafted server \nrequest, a remote attacker could exploit this to modify the contents, or \nsteal confidential data, within the same domain. This issue did not affect \nUbuntu 11.10. (CVE-2011-3361)\n\nJamie Strandboge discovered that BackupPC did not properly sanitize its \ninput when processing log file viewer error messages, resulting in \ncross-site scripting (XSS) vulnerabilities.", "published": "2011-10-27T00:00:00", "modified": "2011-10-27T00:00:00", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "href": "https://ubuntu.com/security/notices/USN-1249-1", "reporter": "Ubuntu", "references": ["https://people.canonical.com/~ubuntu-security/cve/CVE-2011-3361"], "cvelist": ["CVE-2011-3361", "CVE-2011-4923"], "type": "ubuntu", "lastseen": "2020-07-09T00:25:55", "edition": 15, "viewCount": 2, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2011-4923", "CVE-2011-3361"]}, {"type": "openvas", "idList": ["OPENVAS:863714", "OPENVAS:1361412562310840795", "OPENVAS:1361412562310863714", "OPENVAS:1361412562310802622", "OPENVAS:864038", "OPENVAS:1361412562310864038", "OPENVAS:840795"]}, {"type": "nessus", "idList": ["MANDRIVA_MDVSA-2013-062.NASL", "FEDORA_2012-0826.NASL", "FEDORA_2012-0825.NASL", "UBUNTU_USN-1249-1.NASL"]}], "modified": "2020-07-09T00:25:55", "rev": 2}, "score": {"value": 4.4, "vector": "NONE", "modified": "2020-07-09T00:25:55", "rev": 2}, "vulnersScore": 4.4}, "affectedPackage": [{"OS": "Ubuntu", "OSVersion": "11.04", "arch": "noarch", "operator": "lt", "packageFilename": "UNKNOWN", "packageName": "backuppc", "packageVersion": "3.2.0-3ubuntu4.2"}, {"OS": "Ubuntu", "OSVersion": "11.10", "arch": "noarch", "operator": "lt", "packageFilename": "UNKNOWN", "packageName": "backuppc", "packageVersion": "3.2.1-1ubuntu1.1"}, {"OS": "Ubuntu", "OSVersion": "10.04", "arch": "noarch", "operator": "lt", "packageFilename": "UNKNOWN", "packageName": "backuppc", "packageVersion": "3.1.0-9ubuntu1.2"}, {"OS": "Ubuntu", "OSVersion": "10.10", "arch": "noarch", "operator": "lt", "packageFilename": "UNKNOWN", "packageName": "backuppc", "packageVersion": "3.1.0-9ubuntu2.2"}, {"OS": "Ubuntu", "OSVersion": "8.04", "arch": "noarch", "operator": "lt", "packageFilename": "UNKNOWN", "packageName": "backuppc", "packageVersion": "3.0.0-4ubuntu1.3"}], "scheme": null, "immutableFields": []}
{"cve": [{"lastseen": "2021-02-02T05:51:09", "description": "Cross-site scripting (XSS) vulnerability in View.pm in BackupPC 3.0.0, 3.1.0, 3.2.0, 3.2.1, and possibly earlier allows remote attackers to inject arbitrary web script or HTML via the num parameter in a view action to index.cgi, related to the log file viewer, a different vulnerability than CVE-2011-3361.", "edition": 4, "cvss3": {}, "published": "2012-02-18T00:55:00", "title": "CVE-2011-4923", "type": "cve", "cwe": ["CWE-79"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2011-4923"], "modified": "2017-08-29T01:30:00", "cpe": ["cpe:/a:craig_barratt:backuppc:3.0.0", "cpe:/a:craig_barratt:backuppc:3.1.0", "cpe:/a:craig_barratt:backuppc:3.2.1", "cpe:/a:craig_barratt:backuppc:3.2.0"], "id": "CVE-2011-4923", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4923", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:craig_barratt:backuppc:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:craig_barratt:backuppc:3.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:craig_barratt:backuppc:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:craig_barratt:backuppc:3.1.0:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T05:51:06", "description": "Cross-site scripting (XSS) vulnerability in CGI/Browse.pm in BackupPC 3.2.0 and possibly other versions before 3.2.1 allows remote attackers to inject arbitrary web script or HTML via the num parameter in a browse action to index.cgi.", "edition": 4, "cvss3": {}, "published": "2012-02-18T00:55:00", "title": "CVE-2011-3361", "type": "cve", "cwe": ["CWE-79"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2011-3361"], "modified": "2017-08-29T01:30:00", "cpe": ["cpe:/a:craig_barratt:backuppc:3.2.0"], "id": "CVE-2011-3361", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3361", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:craig_barratt:backuppc:3.2.0:*:*:*:*:*:*:*"]}], "openvas": [{"lastseen": "2020-05-08T19:08:39", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-3361", "CVE-2011-5081", "CVE-2011-4923"], "description": "This host is running BackupPC and is prone to multiple cross site\n scripting vulnerabilities.", "modified": "2020-05-06T00:00:00", "published": "2012-04-04T00:00:00", "id": "OPENVAS:1361412562310802622", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310802622", "type": "openvas", "title": "BackupPC 'index.cgi' Multiple Cross Site Scripting Vulnerabilities", "sourceData": "##############################################################################\n# OpenVAS Vulnerability Test\n#\n# BackupPC 'index.cgi' Multiple Cross Site Scripting Vulnerabilities\n#\n# Authors:\n# Sooraj KS <kssooraj@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.802622\");\n script_version(\"2020-05-06T07:10:15+0000\");\n script_bugtraq_id(47628, 50406);\n script_cve_id(\"CVE-2011-3361\", \"CVE-2011-5081\", \"CVE-2011-4923\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_tag(name:\"last_modification\", value:\"2020-05-06 07:10:15 +0000 (Wed, 06 May 2020)\");\n script_tag(name:\"creation_date\", value:\"2012-04-04 14:49:38 +0530 (Wed, 04 Apr 2012)\");\n script_name(\"BackupPC 'index.cgi' Multiple Cross Site Scripting Vulnerabilities\");\n\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/44259\");\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/44385\");\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/46615\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-1249-1\");\n script_xref(name:\"URL\", value:\"http://xforce.iss.net/xforce/xfdb/67170\");\n script_xref(name:\"URL\", value:\"http://xforce.iss.net/xforce/xfdb/71030\");\n script_xref(name:\"URL\", value:\"https://www.htbridge.com/advisory/multiple_xss_vulnerabilities_in_backuppc.html\");\n\n script_category(ACT_ATTACK);\n script_copyright(\"Copyright (C) 2012 Greenbone Networks GmbH\");\n script_family(\"Web application abuses\");\n script_dependencies(\"find_service.nasl\", \"no404.nasl\", \"webmirror.nasl\", \"DDI_Directory_Scanner.nasl\", \"global_settings.nasl\");\n script_require_ports(\"Services/www\", 80);\n script_exclude_keys(\"Settings/disable_cgi_scanning\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote attackers to insert\n arbitrary HTML and script code, which will be executed in a user's browser\n session in the context of an affected site.\");\n\n script_tag(name:\"affected\", value:\"BackupPC version 3.2.0 and prior.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws are due to improper validation of user-supplied\n input to 'num' and 'share' parameters in index.cgi, which allows attackers to\n execute arbitrary HTML and script code in a user's browser session in the\n context of an affected site.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to BackupPC version 3.2.1 or later.\");\n\n script_tag(name:\"summary\", value:\"This host is running BackupPC and is prone to multiple cross site\n scripting vulnerabilities.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"remote_app\");\n exit(0);\n}\n\ninclude(\"http_func.inc\");\ninclude(\"http_keepalive.inc\");\n\nport = http_get_port(default:80);\n\nforeach dir (make_list_unique(\"/backuppc\", \"/\", http_cgi_dirs(port:port)))\n{\n\n if(dir == \"/\") dir = \"\";\n url = dir + \"/index.cgi\";\n\n if(http_vuln_check(port:port, url:url, check_header:TRUE,\n pattern:\"<title>BackupPC\"))\n {\n url += \"?action=RestoreFile&host=localhost&num=1&share=\" +\n \"<script>alert(document.cookie)</script>\";\n\n if(http_vuln_check(port:port, url:url, check_header:TRUE,\n pattern:\"<script>alert\\(document.cookie\\)</script>\",\n extra_check:\"<title>BackupPC\"))\n {\n security_message(port:port);\n exit(0);\n }\n }\n}\n\nexit(99);\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2019-05-29T18:39:53", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-3361"], "description": "Ubuntu Update for Linux kernel vulnerabilities USN-1249-1", "modified": "2019-03-13T00:00:00", "published": "2011-10-31T00:00:00", "id": "OPENVAS:1361412562310840795", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310840795", "type": "openvas", "title": "Ubuntu Update for backuppc USN-1249-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1249_1.nasl 14132 2019-03-13 09:25:59Z cfischer $\n#\n# Ubuntu Update for backuppc USN-1249-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-1249-1/\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.840795\");\n script_version(\"$Revision: 14132 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 10:25:59 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-10-31 13:45:00 +0100 (Mon, 31 Oct 2011)\");\n script_xref(name:\"USN\", value:\"1249-1\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_cve_id(\"CVE-2011-3361\");\n script_name(\"Ubuntu Update for backuppc USN-1249-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(10\\.10|10\\.04 LTS|11\\.04|8\\.04 LTS)\");\n script_tag(name:\"summary\", value:\"Ubuntu Update for Linux kernel vulnerabilities USN-1249-1\");\n script_tag(name:\"affected\", value:\"backuppc on Ubuntu 11.04,\n Ubuntu 10.10,\n Ubuntu 10.04 LTS,\n Ubuntu 8.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"insight\", value:\"It was discovered that BackupPC did not properly sanitize its input when\n processing backup browser error messages, resulting in a cross-site\n scripting (XSS) vulnerability. With cross-site scripting vulnerabilities,\n if a user were tricked into viewing server output during a crafted server\n request, a remote attacker could exploit this to modify the contents, or\n steal confidential data, within the same domain. This issue did not affect\n Ubuntu 11.10. (CVE-2011-3361)\n\n Jamie Strandboge discovered that BackupPC did not properly sanitize its\n input when processing log file viewer error messages, resulting in\n cross-site scripting (XSS) vulnerabilities.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU10.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"backuppc\", ver:\"3.1.0-9ubuntu2.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU10.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"backuppc\", ver:\"3.1.0-9ubuntu1.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU11.04\")\n{\n\n if ((res = isdpkgvuln(pkg:\"backuppc\", ver:\"3.2.0-3ubuntu4.2\", rls:\"UBUNTU11.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU8.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"backuppc\", ver:\"3.0.0-4ubuntu1.3\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2018-01-02T10:57:03", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-3361"], "description": "Check for the Version of BackupPC", "modified": "2017-12-27T00:00:00", "published": "2012-02-03T00:00:00", "id": "OPENVAS:863714", "href": "http://plugins.openvas.org/nasl.php?oid=863714", "type": "openvas", "title": "Fedora Update for BackupPC FEDORA-2012-0826", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for BackupPC FEDORA-2012-0826\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"BackupPC on Fedora 15\";\ntag_insight = \"BackupPC is a high-performance, enterprise-grade system for backing up Linux\n and WinXX and Mac OS X PCs and laptops to a server's disk. BackupPC is highly\n configurable and easy to install and maintain.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2012-February/072682.html\");\n script_id(863714);\n script_version(\"$Revision: 8249 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-27 07:29:56 +0100 (Wed, 27 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-02-03 11:22:16 +0530 (Fri, 03 Feb 2012)\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_cve_id(\"CVE-2011-3361\");\n script_xref(name: \"FEDORA\", value: \"2012-0826\");\n script_name(\"Fedora Update for BackupPC FEDORA-2012-0826\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of BackupPC\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC15\")\n{\n\n if ((res = isrpmvuln(pkg:\"BackupPC\", rpm:\"BackupPC~3.2.1~7.fc15\", rls:\"FC15\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2018-01-02T10:57:13", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-3361"], "description": "Check for the Version of BackupPC", "modified": "2018-01-02T00:00:00", "published": "2012-04-02T00:00:00", "id": "OPENVAS:864038", "href": "http://plugins.openvas.org/nasl.php?oid=864038", "type": "openvas", "title": "Fedora Update for BackupPC FEDORA-2012-0825", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for BackupPC FEDORA-2012-0825\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"BackupPC on Fedora 16\";\ntag_insight = \"BackupPC is a high-performance, enterprise-grade system for backing up Linux\n and WinXX and Mac OS X PCs and laptops to a server's disk. BackupPC is highly\n configurable and easy to install and maintain.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2012-February/072706.html\");\n script_id(864038);\n script_version(\"$Revision: 8267 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-02 07:29:17 +0100 (Tue, 02 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-04-02 13:04:20 +0530 (Mon, 02 Apr 2012)\");\n script_cve_id(\"CVE-2011-3361\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_xref(name: \"FEDORA\", value: \"2012-0825\");\n script_name(\"Fedora Update for BackupPC FEDORA-2012-0825\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of BackupPC\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC16\")\n{\n\n if ((res = isrpmvuln(pkg:\"BackupPC\", rpm:\"BackupPC~3.2.1~7.fc16\", rls:\"FC16\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2017-12-04T11:26:52", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-3361"], "description": "Ubuntu Update for Linux kernel vulnerabilities USN-1249-1", "modified": "2017-12-01T00:00:00", "published": "2011-10-31T00:00:00", "id": "OPENVAS:840795", "href": "http://plugins.openvas.org/nasl.php?oid=840795", "type": "openvas", "title": "Ubuntu Update for backuppc USN-1249-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1249_1.nasl 7964 2017-12-01 07:32:11Z santu $\n#\n# Ubuntu Update for backuppc USN-1249-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"It was discovered that BackupPC did not properly sanitize its input when\n processing backup browser error messages, resulting in a cross-site\n scripting (XSS) vulnerability. With cross-site scripting vulnerabilities,\n if a user were tricked into viewing server output during a crafted server\n request, a remote attacker could exploit this to modify the contents, or\n steal confidential data, within the same domain. This issue did not affect\n Ubuntu 11.10. (CVE-2011-3361)\n\n Jamie Strandboge discovered that BackupPC did not properly sanitize its\n input when processing log file viewer error messages, resulting in\n cross-site scripting (XSS) vulnerabilities.\";\n\ntag_summary = \"Ubuntu Update for Linux kernel vulnerabilities USN-1249-1\";\ntag_affected = \"backuppc on Ubuntu 11.04 ,\n Ubuntu 10.10 ,\n Ubuntu 10.04 LTS ,\n Ubuntu 8.04 LTS\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-1249-1/\");\n script_id(840795);\n script_version(\"$Revision: 7964 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 08:32:11 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-10-31 13:45:00 +0100 (Mon, 31 Oct 2011)\");\n script_xref(name: \"USN\", value: \"1249-1\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_cve_id(\"CVE-2011-3361\");\n script_name(\"Ubuntu Update for backuppc USN-1249-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU10.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"backuppc\", ver:\"3.1.0-9ubuntu2.2\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU10.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"backuppc\", ver:\"3.1.0-9ubuntu1.2\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU11.04\")\n{\n\n if ((res = isdpkgvuln(pkg:\"backuppc\", ver:\"3.2.0-3ubuntu4.2\", rls:\"UBUNTU11.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU8.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"backuppc\", ver:\"3.0.0-4ubuntu1.3\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2019-05-29T18:39:18", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-3361"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2012-02-03T00:00:00", "id": "OPENVAS:1361412562310863714", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310863714", "type": "openvas", "title": "Fedora Update for BackupPC FEDORA-2012-0826", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for BackupPC FEDORA-2012-0826\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2012-February/072682.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.863714\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-02-03 11:22:16 +0530 (Fri, 03 Feb 2012)\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_cve_id(\"CVE-2011-3361\");\n script_xref(name:\"FEDORA\", value:\"2012-0826\");\n script_name(\"Fedora Update for BackupPC FEDORA-2012-0826\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'BackupPC'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC15\");\n script_tag(name:\"affected\", value:\"BackupPC on Fedora 15\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC15\")\n{\n\n if ((res = isrpmvuln(pkg:\"BackupPC\", rpm:\"BackupPC~3.2.1~7.fc15\", rls:\"FC15\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2019-05-29T18:39:00", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-3361"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2012-04-02T00:00:00", "id": "OPENVAS:1361412562310864038", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310864038", "type": "openvas", "title": "Fedora Update for BackupPC FEDORA-2012-0825", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for BackupPC FEDORA-2012-0825\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2012-February/072706.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.864038\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-04-02 13:04:20 +0530 (Mon, 02 Apr 2012)\");\n script_cve_id(\"CVE-2011-3361\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_xref(name:\"FEDORA\", value:\"2012-0825\");\n script_name(\"Fedora Update for BackupPC FEDORA-2012-0825\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'BackupPC'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC16\");\n script_tag(name:\"affected\", value:\"BackupPC on Fedora 16\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC16\")\n{\n\n if ((res = isrpmvuln(pkg:\"BackupPC\", rpm:\"BackupPC~3.2.1~7.fc16\", rls:\"FC16\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}], "nessus": [{"lastseen": "2021-01-12T10:09:51", "description": " - change %%{_sharedstatedir} to %%{_localstatedir}/lib as\n these expand differently on EL (bz #767719)\n\n - fix XSS vulnerability (bz #749846, bz #749847, bz\n #749848) CVE-2011-3361\n\n - additional documentation about enabling correct\n channels in RHEL to resolve all dependencies (bz\n #749627)\n\n - fix bug with missing tmpfiles.d directory\n\n - add perl(Digest::MD5) to list of build and install\n dependencies\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 12, "published": "2012-02-02T00:00:00", "title": "Fedora 15 : BackupPC-3.2.1-7.fc15 (2012-0826)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-3361"], "modified": "2012-02-02T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:BackupPC", "cpe:/o:fedoraproject:fedora:15"], "id": "FEDORA_2012-0826.NASL", "href": "https://www.tenable.com/plugins/nessus/57782", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2012-0826.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(57782);\n script_version(\"1.13\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_bugtraq_id(50406);\n script_xref(name:\"FEDORA\", value:\"2012-0826\");\n\n script_name(english:\"Fedora 15 : BackupPC-3.2.1-7.fc15 (2012-0826)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\" - change %%{_sharedstatedir} to %%{_localstatedir}/lib as\n these expand differently on EL (bz #767719)\n\n - fix XSS vulnerability (bz #749846, bz #749847, bz\n #749848) CVE-2011-3361\n\n - additional documentation about enabling correct\n channels in RHEL to resolve all dependencies (bz\n #749627)\n\n - fix bug with missing tmpfiles.d directory\n\n - add perl(Digest::MD5) to list of build and install\n dependencies\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=749627\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=749846\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=749847\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=749848\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=767719\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2012-February/072682.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?1d1f3bb3\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected BackupPC package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:ND\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:BackupPC\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:15\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/01/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/02/02\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^15([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 15.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC15\", reference:\"BackupPC-3.2.1-7.fc15\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"BackupPC\");\n}\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2021-01-12T10:09:51", "description": " - change %%{_sharedstatedir} to %%{_localstatedir}/lib as\n these expand differently on EL (bz #767719)\n\n - fix XSS vulnerability (bz #749846, bz #749847, bz\n #749848) CVE-2011-3361\n\n - additional documentation about enabling correct\n channels in RHEL to resolve all dependencies (bz\n #749627)\n\n - fix bug with missing tmpfiles.d directory\n\n - add perl(Digest::MD5) to list of build and install\n dependencies\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 12, "published": "2012-02-02T00:00:00", "title": "Fedora 16 : BackupPC-3.2.1-7.fc16 (2012-0825)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-3361"], "modified": "2012-02-02T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:BackupPC", "cpe:/o:fedoraproject:fedora:16"], "id": "FEDORA_2012-0825.NASL", "href": "https://www.tenable.com/plugins/nessus/57781", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2012-0825.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(57781);\n script_version(\"1.13\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_bugtraq_id(50406);\n script_xref(name:\"FEDORA\", value:\"2012-0825\");\n\n script_name(english:\"Fedora 16 : BackupPC-3.2.1-7.fc16 (2012-0825)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\" - change %%{_sharedstatedir} to %%{_localstatedir}/lib as\n these expand differently on EL (bz #767719)\n\n - fix XSS vulnerability (bz #749846, bz #749847, bz\n #749848) CVE-2011-3361\n\n - additional documentation about enabling correct\n channels in RHEL to resolve all dependencies (bz\n #749627)\n\n - fix bug with missing tmpfiles.d directory\n\n - add perl(Digest::MD5) to list of build and install\n dependencies\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=749627\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=749846\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=749847\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=749848\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=767719\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2012-February/072706.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?3eedd41d\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected BackupPC package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:ND\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:BackupPC\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:16\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/01/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/02/02\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^16([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 16.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC16\", reference:\"BackupPC-3.2.1-7.fc16\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"BackupPC\");\n}\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N"}}, {"lastseen": "2021-04-01T07:19:16", "description": "It was discovered that BackupPC did not properly sanitize its input\nwhen processing backup browser error messages, resulting in a\ncross-site scripting (XSS) vulnerability. With cross-site scripting\nvulnerabilities, if a user were tricked into viewing server output\nduring a crafted server request, a remote attacker could exploit this\nto modify the contents, or steal confidential data, within the same\ndomain. This issue did not affect Ubuntu 11.10. (CVE-2011-3361)\n\nJamie Strandboge discovered that BackupPC did not properly sanitize\nits input when processing log file viewer error messages, resulting in\ncross-site scripting (XSS) vulnerabilities.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 27, "published": "2011-10-28T00:00:00", "title": "Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 / 11.10 : backuppc vulnerabilites (USN-1249-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-3361"], "modified": "2021-04-02T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:backuppc", "cpe:/o:canonical:ubuntu_linux:11.10", "cpe:/o:canonical:ubuntu_linux:11.04", "cpe:/o:canonical:ubuntu_linux:10.04:-:lts", "cpe:/o:canonical:ubuntu_linux:8.04:-:lts", "cpe:/o:canonical:ubuntu_linux:10.10"], "id": "UBUNTU_USN-1249-1.NASL", "href": "https://www.tenable.com/plugins/nessus/56664", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-1249-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(56664);\n script_version(\"1.8\");\n script_cvs_date(\"Date: 2019/09/19 12:54:27\");\n\n script_cve_id(\"CVE-2011-3361\");\n script_xref(name:\"USN\", value:\"1249-1\");\n\n script_name(english:\"Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 / 11.10 : backuppc vulnerabilites (USN-1249-1)\");\n script_summary(english:\"Checks dpkg output for updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Ubuntu host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"It was discovered that BackupPC did not properly sanitize its input\nwhen processing backup browser error messages, resulting in a\ncross-site scripting (XSS) vulnerability. With cross-site scripting\nvulnerabilities, if a user were tricked into viewing server output\nduring a crafted server request, a remote attacker could exploit this\nto modify the contents, or steal confidential data, within the same\ndomain. This issue did not affect Ubuntu 11.10. (CVE-2011-3361)\n\nJamie Strandboge discovered that BackupPC did not properly sanitize\nits input when processing log file viewer error messages, resulting in\ncross-site scripting (XSS) vulnerabilities.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/1249-1/\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected backuppc package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:backuppc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:10.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:10.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:11.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:11.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:8.04:-:lts\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2012/02/17\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/10/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/10/28\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2011-2019 Canonical, Inc. / NASL script (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(8\\.04|10\\.04|10\\.10|11\\.04|11\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 8.04 / 10.04 / 10.10 / 11.04 / 11.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"8.04\", pkgname:\"backuppc\", pkgver:\"3.0.0-4ubuntu1.3\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"backuppc\", pkgver:\"3.1.0-9ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"backuppc\", pkgver:\"3.1.0-9ubuntu2.2\")) flag++;\nif (ubuntu_check(osver:\"11.04\", pkgname:\"backuppc\", pkgver:\"3.2.0-3ubuntu4.2\")) flag++;\nif (ubuntu_check(osver:\"11.10\", pkgname:\"backuppc\", pkgver:\"3.2.1-1ubuntu1.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"backuppc\");\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2021-01-07T11:54:05", "description": "Updated backuppc packages fix security vulnerabilities :\n\nCross-site scripting (XSS) vulnerability in RestoreFile.pm in BackupPC\n3.1.0, 3.2.1, and possibly other earlier versions allows remote\nattackers to inject arbitrary web script or HTML via the share\nparameter in a RestoreFile action to index.cgi (CVE-2011-5081).\n\nCross-site scripting (XSS) vulnerability in View.pm in BackupPC 3.0.0,\n3.1.0, 3.2.0, 3.2.1, and possibly earlier allows remote attackers to\ninject arbitrary web script or HTML via the num parameter in a view\naction to index.cgi, related to the log file viewer (CVE-2011-4923).\n\nAlso, This update package corrects/improves the definition of\nvariables in config.pl, the configuration file of backuppc: the\nvariables SshPath, SmbClientPath, NmbLookupPath, TarClientPath,\nTopDir. As a result, backuppc should now run with the default values\ninstalled by the Mageia package, modifications of config.pl should\nonly be required for defining site-specific settings.", "edition": 25, "published": "2013-04-20T00:00:00", "title": "Mandriva Linux Security Advisory : backuppc (MDVSA-2013:062)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2011-5081", "CVE-2011-4923"], "modified": "2013-04-20T00:00:00", "cpe": ["cpe:/o:mandriva:business_server:1", "p-cpe:/a:mandriva:linux:backuppc"], "id": "MANDRIVA_MDVSA-2013-062.NASL", "href": "https://www.tenable.com/plugins/nessus/66076", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandriva Linux Security Advisory MDVSA-2013:062. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(66076);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2011-4923\", \"CVE-2011-5081\");\n script_bugtraq_id(47628, 50406);\n script_xref(name:\"MDVSA\", value:\"2013:062\");\n script_xref(name:\"MGASA\", value:\"2012-0139\");\n\n script_name(english:\"Mandriva Linux Security Advisory : backuppc (MDVSA-2013:062)\");\n script_summary(english:\"Checks rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Mandriva Linux host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated backuppc packages fix security vulnerabilities :\n\nCross-site scripting (XSS) vulnerability in RestoreFile.pm in BackupPC\n3.1.0, 3.2.1, and possibly other earlier versions allows remote\nattackers to inject arbitrary web script or HTML via the share\nparameter in a RestoreFile action to index.cgi (CVE-2011-5081).\n\nCross-site scripting (XSS) vulnerability in View.pm in BackupPC 3.0.0,\n3.1.0, 3.2.0, 3.2.1, and possibly earlier allows remote attackers to\ninject arbitrary web script or HTML via the num parameter in a view\naction to index.cgi, related to the log file viewer (CVE-2011-4923).\n\nAlso, This update package corrects/improves the definition of\nvariables in config.pl, the configuration file of backuppc: the\nvariables SshPath, SmbClientPath, NmbLookupPath, TarClientPath,\nTopDir. As a result, backuppc should now run with the default values\ninstalled by the Mageia package, modifications of config.pl should\nonly be required for defining site-specific settings.\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected backuppc package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:backuppc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:business_server:1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/04/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/04/20\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"backuppc-3.2.1-6.1.mbs1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}], "fedora": [{"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2011-3361"], "description": "BackupPC is a high-performance, enterprise-grade system for backing up Linux and WinXX and Mac OS X PCs and laptops to a server's disk. BackupPC is high ly configurable and easy to install and maintain. ", "modified": "2012-02-01T19:29:35", "published": "2012-02-01T19:29:35", "id": "FEDORA:C1321208FE", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 16 Update: BackupPC-3.2.1-7.fc16", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2020-12-21T08:17:50", "bulletinFamily": "unix", "cvelist": ["CVE-2011-3361"], "description": "BackupPC is a high-performance, enterprise-grade system for backing up Linux and WinXX and Mac OS X PCs and laptops to a server's disk. BackupPC is high ly configurable and easy to install and maintain. ", "modified": "2012-02-01T19:22:06", "published": "2012-02-01T19:22:06", "id": "FEDORA:755F620BDA", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 15 Update: BackupPC-3.2.1-7.fc15", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}]}