27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: No solution is known at this time.<br />

CVE-2007-6656<br />

Atlassian JIRA < 3.12.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4329 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:29834<br />

Description: Synopsis :\n\nThe remote web server contains an application that is affected by one or<br />

more vulnerabilities.\n\nAtlassian JIRA, a web-based application for bug tracking, issue<br />

tracking and project management, installed on the remote web server is affected by one or<br />

more of the following issues :\n\n - A cross-site scripting issue due to its failure to sanitize<br />

error messages under a user's control and passed to the '500page.jsp' script before using<br />

them to generate dynamic output.\n\n - A security bypass issue that may allow an attacker<br />

to change JIRA's default language by accessing its first setup page directly.\n\n - A security<br />

bypass issue by which a user may delete a shared filter created by another user.\n<br />

Solution: Upgrade to version 3.12.1 or higher or patch according to vendor recommendations.<br />

CVE-2007-6617<br />

Mort Bay Jetty < 6.1.7 Double Slash Information Disclosure<br />

<strong>PVS</strong> ID: 4330 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:29852<br />

Description: Synopsis :\n\nThe remote web server is affected by an information disclosure<br />

vulnerability.\n\n The remote instance of Mort Bay Jetty allows an attacker to view static<br />

content in WEB-INF and behind security constraints because of the approach it uses to<br />

compact URLs like '/foo///bar'.<br />

Solution: Upgrade to version 6.1.7 or higher.<br />

CVE-2007-6672<br />

PHP < 4.4.8 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4331 FAMILY: Web Servers RISK: HIGH NESSUS ID:29833<br />

Description: Synopsis : \n\nThe remote web server uses a version of PHP that is affected by multiple<br />

issues.\n\n According to its banner, the version of PHP installed on the remote host is older<br />

than 4.4.8. Such versions may be affected by several issues, including integer overflows<br />

involving the 'chunk_split', 'strcspn', and 'strspn' functions, and 'safe_mode' / 'open_basedir'<br />

bypasses. The installed version of PHP is: \n %L<br />

Solution: Upgrade to version 4.4.8 or higher.<br />

CVE-2007-3378<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1128

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!