27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CVE Not available<br />

Box.net File Sharing Detection<br />

<strong>PVS</strong> ID: 4161 FAMILY: Internet Services RISK: LOW NESSUS ID:Not Available<br />

Description: The remote client is utilizing the 'Box.net' service. Box.net allows users to upload files to<br />

an external web server that can then be accessed from the Internet. Box.net allows internal<br />

users to store resources on an Internet server and then share or access the documents from<br />

any location.<br />

Solution: Ensure that such usage is in alignment with corporate policies regarding remote access.<br />

CVE Not available<br />

Help Center Live < 2.1.5 Admin Authentication Bypass<br />

<strong>PVS</strong> ID: 4162 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote web server is running Help Center Live, a help desk<br />

application written in PHP. The remote version of this software is vulnerable to a flaw in<br />

the way that it handles access to certain administrative pages. Specifically,<br />

'admin/departments.php' and 'admin/operators.php' fails to block access to unauthenticated<br />

users. An attacker exploiting this flaw would be able to gain administrative access to the<br />

application.<br />

Solution: Upgrade to a version 2.1.5 or higher.<br />

Serendipity <<br />

CVE-2007-4240<br />

<strong>PVS</strong> ID: 4163 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication\n\nThe remote host is running Serendipity, a web log application. This<br />

version of Serendipity is vulnerable to a flaw where authenticated users can access<br />

restricted 'administrative' functions. An attacker exploiting this flaw would require a user<br />

ID and password to some portion of the web application. Successful exploitation would<br />

allow the user to gain limited administrative access.<br />

Solution: Upgrade to a version higher than 1.1.3 or 1.2-beta4.<br />

CVE-2007-4282<br />

MediaMax File Sharing Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4164 FAMILY: Internet Services RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 1081

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!