27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: Ensure that there is code coverage within the corporate SDL.<br />

CVE Not available<br />

Email Address Obfuscated Within HTML Comments<br />

<strong>PVS</strong> ID: 4710 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server was observed responding to a web request with HTML code that<br />

consisted of an email address obfuscated within the HTML comments. The email address<br />

observed was: \n %L \n\nThe request which generated this response was: \n%P<br />

Solution: Whenever possible, remove information that attackers may find useful for future attacks.<br />

'.dll' File Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 4711 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server is hosting and allowing the download of '.dll' files. As an<br />

example, consider the following file %P\nThe webmaster should make sure that they<br />

do not contain confidential data.<br />

Solution: N/A<br />

CVE Not available<br />

Apache < 2.2.10 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4712 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:34433<br />

Description: Synopsis :\n\nThe remote web server is vulnerable to multiple attack vectors.\n\nThe<br />

observed version of Apache HTTP Server is %L.\n\nVersions of Apache HTTP Server<br />

earlier than 2.2.10 are potentially affected by multiple vulnerabilities :\n\n - An information<br />

disclosure vulnerability in mod_proxy_http. Note that this only affects Apache on Unix<br />

systems. (CVE-2010-2791)\n\n - The mod_proxy_ftp module in the version of Apache<br />

installed on the remote host fails to properly sanitize user-supplied URL input before using<br />

it to generate dynamic HTML output. Using specially crafted requests for FTP URLs with<br />

globbing characters (such as asterisk, tilde, opening square bracket, etc.), an attacker may<br />

be able to leverage this issue to inject arbitrary HTML and script code into a user's browser<br />

to be executed within the security context of the affected site. (CVE-2008-2939)<br />

Solution: Either disable the affected module or upgrade to version 2.2.10 or higher.<br />

CVE-2010-2791<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Titan FTP Server < 6.26 Build 631 SITE WHO Command DoS<br />

Family Internet Services 1238

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!