27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>PVS</strong> ID: 4621 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:33866<br />

Description: Synopsis :\n\nThe remote web server is prone to a directory traversal attack.\n\nThe version<br />

of Apache Tomcat installed on the remote host is affected by a directory traversal issue. By<br />

encoding directory traversal sequences as UTF-8 in a request, an unauthenticated remote<br />

attacker can leverage this issue to view arbitrary files on the remote host. Note that<br />

successful exploitation requires that a context be configured with 'allowLinking' set to 'true'<br />

and the connector with 'URIEncoding' set to 'UTF-8', neither of which is a default setting.<br />

Solution: Upgrade to version 6.0.18 or higher.<br />

CVE-2008-2938<br />

Grendel Web Application Scanner Detection<br />

<strong>PVS</strong> ID: 4622 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote host is running the Grendel web application scanner.<br />

Grendel is an attack framework that allows users to automatically scan and fuzz web<br />

application servers.<br />

Solution: Ensure that this application is authorized according to corporate policies and guidelines.<br />

CVE Not available<br />

JBoss EAP < 4.2.0.CP03 / 4.3.0.CP01 Status Servlet Information Disclosure<br />

<strong>PVS</strong> ID: 4623 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:33869<br />

Description: Synopsis :\n\nThe remote web server contains a servlet that is affected by an information<br />

disclosure vulnerability.\n\nThe version of JBoss Enterprise Application Platform (EAP)<br />

running on the remote host allows unauthenticated access to the status servlet, which is<br />

used to monitor sessions and requests sent to the server.<br />

Solution: Upgrade to version 4.2.0.CP03 / 4.3.0.CP01 or higher.<br />

CVE-2008-3273<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

HP-UX ftpd Remote Privileged Access Authentication Bypass<br />

<strong>PVS</strong> ID: 4624 FAMILY: FTP Servers RISK: HIGH NESSUS ID:33899<br />

Description: Synopsis :\n\nThe remote FTP server may allow remote privileged access.\n\nAccording to<br />

its banner, the version of the HP-UX FTP server running on the remote host is at a patch<br />

level before PHNE_38458. Such versions reportedly contain an unspecified vulnerability<br />

that in certain account configurations could be exploited by an anonymous remote attacker<br />

to gain privileged access.\nIAVT Reference : 2008-T-0045\nSTIG Finding Severity :<br />

Category I<br />

Family Internet Services 1211

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!