Vulnerabilities > CVE-2006-3425 - Authentication Bypass vulnerability in PatchLink Update Server Proxyreg.ASP
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
FastPatch for (a) PatchLink Update Server (PLUS) before 6.1 P1 and 6.2.x before 6.2 SR1 P1, and (b) Novell ZENworks 6.2 SR1 and earlier, does not require authentication for dagent/proxyreg.asp, which allows remote attackers to list, add, or delete PatchLink Distribution Point (PDP) proxy servers via modified (1) List, (2) Proxy, or (3) Delete parameters.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 3 | |
Application | 1 |
Nessus
NASL family | CGI abuses |
NASL id | PLUS_PROXYREG_AUTH_BYPASS.NASL |
description | The remote host is running PatchLink Update Server, a patch and vulnerability management solution. The version of PatchLink Update Server installed on the remote fails to check for authentication credentials before providing access to the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 22117 |
published | 2006-07-28 |
reporter | This script is Copyright (C) 2006-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/22117 |
title | PatchLink Update Server proxyreg.asp Arbitrary Proxy Manipulation |
code |
|
References
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/047495.html
- http://secunia.com/advisories/20876
- http://secunia.com/advisories/20878
- http://securityreason.com/securityalert/1200
- http://securitytracker.com/id?1016405
- http://www.securityfocus.com/archive/1/438710/100/0/threaded
- http://www.securityfocus.com/bid/18723
- http://www.vupen.com/english/advisories/2006/2595
- http://www.vupen.com/english/advisories/2006/2596