27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

vulnerable to a flaw where users can bypass authentication and gain administrative access<br />

to the application. Successful exploitation would lead to the compromise of confidentiality,<br />

integrity, and availability on the remote machine.<br />

Solution: Upgrade to version 1.6.8 or higher.<br />

WordPress <<br />

CVE-2006-6913<br />

<strong>PVS</strong> ID: 3881 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running WordPress, a web blog manager written in PHP. The remote version of this<br />

software is reported to be vulnerable to a flaw where a remote attacker can inject malicious<br />

SQL statements into the 'tb_id' parameter of the 'wp-trackback.php' script. An attacker<br />

exploiting this flaw would only need to be able to send queries to the remote web server.<br />

Successful exploitation would result in the attacker executing arbitrary SQL statements on<br />

the database server utilized by WordPress. The path to the vulnerable application is:\n%P<br />

Solution: No solution is known at this time.<br />

CVE-2007-0233<br />

PHPMyAdmin < 2.9.2 rc2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3882 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running phpMyAdmin, a web interface for administering MySQL database servers. This<br />

version of phpMyAdmin is vulnerable to an HTML injection attack as well as several<br />

undisclosed vulnerabilities. The details of the flaws will be released by the vendor;<br />

however, they have released a patched version of phpMyAdmin.<br />

Solution: Upgrade to version 2.9.2 rc2 or higher.<br />

CVE-2007-0204<br />

Socks 4 Proxy Detection<br />

<strong>PVS</strong> ID: 3883 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is acting as a Socks version 4 proxy. This allows remote proxy clients to<br />

tunnel traffic through the host. This sort of behavior is somewhat commonplace on<br />

compromised hosts.<br />

Solution: Ensure that the proxy is authorized with respect to corporate policies and guidelines.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1005

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!