Vulnerabilities > CVE-2006-3425
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
FastPatch for (a) PatchLink Update Server (PLUS) before 6.1 P1 and 6.2.x before 6.2 SR1 P1, and (b) Novell ZENworks 6.2 SR1 and earlier, does not require authentication for dagent/proxyreg.asp, which allows remote attackers to list, add, or delete PatchLink Distribution Point (PDP) proxy servers via modified (1) List, (2) Proxy, or (3) Delete parameters.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 | |
Application | 3 |
Nessus
NASL family | CGI abuses |
NASL id | PLUS_PROXYREG_AUTH_BYPASS.NASL |
description | The remote host is running PatchLink Update Server, a patch and vulnerability management solution. The version of PatchLink Update Server installed on the remote fails to check for authentication credentials before providing access to the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 22117 |
published | 2006-07-28 |
reporter | This script is Copyright (C) 2006-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/22117 |
title | PatchLink Update Server proxyreg.asp Arbitrary Proxy Manipulation |
code |
|
References
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/047495.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/047495.html
- http://secunia.com/advisories/20876
- http://secunia.com/advisories/20876
- http://secunia.com/advisories/20878
- http://secunia.com/advisories/20878
- http://securityreason.com/securityalert/1200
- http://securityreason.com/securityalert/1200
- http://securitytracker.com/id?1016405
- http://securitytracker.com/id?1016405
- http://www.securityfocus.com/archive/1/438710/100/0/threaded
- http://www.securityfocus.com/archive/1/438710/100/0/threaded
- http://www.securityfocus.com/bid/18723
- http://www.securityfocus.com/bid/18723
- http://www.vupen.com/english/advisories/2006/2595
- http://www.vupen.com/english/advisories/2006/2595
- http://www.vupen.com/english/advisories/2006/2596
- http://www.vupen.com/english/advisories/2006/2596