27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: Upgrade to version 9.4.0 or higher.<br />

CVE-2008-5734<br />

OneOrZero Helpdesk tinfo.php Arbitrary File Upload<br />

<strong>PVS</strong> ID: 4801 FAMILY: CGI RISK: HIGH NESSUS ID:35261<br />

Description: Synopsis : \n\nThe remote web server contains a PHP application that is affected by an<br />

arbitrary file upload vulnerability.\n\nThe remote host is running OneOrZero Helpdesk, a<br />

web-based helpdesk application written in PHP. The version of OneOrZero HelpDesk<br />

installed on the remote host allows uploads of arbitrary files via the 'tinfo.php' script<br />

provided the 'send_email' POST parameter is set. By uploading a file with arbitrary PHP<br />

code, an unauthenticated remote attacker can likely leverage this issue to execute code<br />

subject to the privileges of the web server user ID. In addition, there is a flaw in the<br />

login.php script when handling the 'default_language' parameter. An attacker would be able<br />

to view or execute arbitrary local files. Note that successful exploitation of this issue<br />

requires that 'Task Attachments' is enabled, which is true by default. Further, note that there<br />

is also reportedly a SQL injection issue involving the Content_Type for uploaded files and<br />

affecting this version of OneOrZero Helpdesk. If "Task Attachments' have been disabled,<br />

you are not vulnerable to this flaw.\n\nThe reported version of OneOrZero is: \n %L<br />

Solution: Log into the application's control panel as the administrator and disable 'Task Attachments'<br />

(under 'OneOrZero Settings'). When released, upgrade to version 1.6.5.8 or higher.<br />

CVE-2009-0886<br />

SPIP Version Detection<br />

<strong>PVS</strong> ID: 4802 FAMILY: CGI RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running SPIP, an application used to rapidly create web content. The<br />

version of SPIP is: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

SSL Certificate Signed Using Weak Hashing Algorithm<br />

<strong>PVS</strong> ID: 4803 FAMILY: Generic RISK: LOW NESSUS ID:35291<br />

Description: Synopsis :\n\nThe SSL certificate has been signed using a weak hash algorithm -<br />

MD5\n\nThe remote service uses an SSL certificate that has been signed using a<br />

cryptographically weak hashing algorithm - MD5. These algorithms are known to be<br />

vulnerable to collision attacks. In theory, a determined attacker may be able to leverage this<br />

weakness to generate another certificate with the same digital signature, which could allow<br />

him to masquerade as the affected service.<br />

Solution: Contact the Certificate Authority to have the certificate reissued.<br />

Family Internet Services 1267

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!