27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: Upgrade to version 2.2.4 or higher.<br />

CVE Not available<br />

Mantis < 0.9.5 / 1.1.0 RC5 view.php HTML Injection<br />

<strong>PVS</strong> ID: 4326 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML injection attack.\n\nThe remote<br />

host appears to be running a vulnerable version of Mantis, a bug tracker web application<br />

written in PHP. The reported version number is '%L'. It is reported that versions lower than<br />

1.1.0 are vulnerable to a persistent HTML injection attack. The root of the flaw is in the<br />

way that Mantis handles user-supplied data to the 'view.php' script. An attacker exploiting<br />

this flaw would only need the ability to send HTTP requests to the 'view.php' script.<br />

Successful exploitation would result in arbitrary code being executed within the browser of<br />

other Mantis users.<br />

Solution: Upgrade to version 0.19.5, 1.0.0 RC5 or higher.<br />

CVE-2008-0404<br />

OpenBiblio < 0.6.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4327 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is missing a critical security patch or<br />

upgrade.\n\nAccording to its version number, the remote host is running a version of<br />

OpenBiblio that is vulnerable to a number of flaws. The reported version info is: \n %L<br />

\n\nOpenBiblio is an open-source, web-based library system. The vendor has released<br />

version 0.6.0 which addresses a number of flaws. An attacker exploiting these flaws would<br />

only require the ability to access the OpenBiblio web interface. Successful exploitation<br />

would allow the attacker to read confidential data and execute malicious code on the local<br />

server, database server and client browser.<br />

Solution: Upgrade to version 0.6.0 or higher.<br />

CVE-2007-6608<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

CMS Made Simple content_css.php templateid Parameter SQL Injection<br />

<strong>PVS</strong> ID: 4328 FAMILY: CGI RISK: HIGH NESSUS ID:29829<br />

Description: Synopsis :\n\nThe remote web server contains a PHP script that is prone to a SQL injection<br />

attack.\n\n The remote host appears to be running CMS Made Simple ( version %L ), a<br />

content management system written in PHP. The version of CMS Made Simple installed on<br />

the remote host fails to sanitize user-supplied input to the 'templateid' parameter of the<br />

'modules/TinyMCE/content_css.php' script before using it in a database query. Regardless<br />

of PHP's 'magic_quotes_gpc' and 'register_globals' settings, an attacker may be able to<br />

exploit this issue to manipulate database queries, leading to disclosure of sensitive<br />

information, modification of data or other attacks against the underlying database.<br />

Family Internet Services 1127

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!