27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: The remote host was just observed sending the following .zip file. %L\nThe file was<br />

sent as an email attachment. If the file is considered confidential, you should consult<br />

your mail server logs for the sender and/or recipient.<br />

Solution: N/A<br />

CVE Not available<br />

Ultimate PHP Board chat/login.php username Parameter Script Injection<br />

<strong>PVS</strong> ID: 3872 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Script Injection attack.\n\nThe<br />

remote host is running Ultimate PHP Board, a message board written in PHP.<br />

Versions of Ultimate less than 2.0b2 are vulnerable to a flaw where remote<br />

attackers can inject and execute script code. Code would be executed with the<br />

privileges of the web server process. The root flaw is in the 'username' parameter of<br />

the 'chat/login.php' script. After uploading the code, the attacker can execute via the<br />

'chat/text.php' script. Successful exploitation results in the attacker impacting<br />

confidentiality, integrity, and availability.<br />

Solution: No solution is known at this time.<br />

CVE-2006-6790<br />

WordPress < 2.0.6 template.php file Parameter HTML Injection<br />

<strong>PVS</strong> ID: 3873 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running WordPress, a web blog manager written in PHP. The remote version of this<br />

software is reported to be vulnerable to a flaw where a remote attacker can inject malicious<br />

script code into the 'file' parameter of the 'template.php' script. Successful exploitation<br />

would result in script code being executed in the browsers of other WordPress clients. In<br />

addition, the application is reported to be vulnerable to a SQL injection attack. An attacker<br />

exploiting this attack vector would only need to send malformed requests to the WordPress<br />

application. Successful exploitation would result in the attacker executing arbitrary SQL<br />

statements on the database server utilized by WordPress. The path to the vulnerable<br />

WordPress application is:\n%P<br />

Solution: Upgrade to version 2.0.6 or higher.<br />

CVE-2007-0107<br />

phpBB < 2.0.22 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3874 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1002

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!