27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nAtlassian JIRA,<br />

a web-based application for bug tracking, issue tracking and project management, installed<br />

on the remote web server is affected by one or more of the following issues : \n\n - A<br />

cross-site scripting issue due to its failure to sanitize user-supplied input that is then<br />

returned in the HTTP response header.\n\n - A cross-site scripting issue within the 'DWR'<br />

library\n\n - A cross-site scripting issue within the 'Charting' plugin.\n\nThe reported<br />

version of Atlassian is: \n %L \n<br />

Solution: Upgrade to version 3.13.3 or higher.<br />

CVE Not available<br />

Apache TomCat mod_jk < 1.2.27 Cross-user Information Disclosure<br />

<strong>PVS</strong> ID: 4984 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running the Apache Tomcat web server with<br />

mod_jk version %L\n\n. mod_jk is reported vulnerable to an information disclosure flaw<br />

due to the way that it processes 'Content-Length' headers. Allegedly, an attacker supplying<br />

a NULL content-length can view the HTTP responses of other requests. An attacker<br />

exploiting this flaw would be able to possibly gain access to confidential data.<br />

Solution: Upgrade to version 1.2.27 or higher.<br />

CVE-2008-5519<br />

phpMyAdmin file_path Parameter Multiple Vulnerabilities (PMASA-2009-1)<br />

<strong>PVS</strong> ID: 4985 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:36083<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe version of<br />

phpMyAdmin installed on the remote host fails to sanitize user-supplied input to the<br />

'file_path' parameter of the 'bs_disp_as_mime_type.php' script before using it to read a file<br />

and reporting it in dynamically generated HTML. An unauthenticated remote attacker may<br />

be able to leverage this issue to read arbitrary files, possibly from third-party hosts, or to<br />

inject arbitrary HTTP headers in responses sent to third-party users. In addition, the version<br />

of phpMyAdmin is reportedly vulnerable to a number of other flaws. The reported version<br />

of phpMyAdmin is: \n %L \n<br />

Solution: Upgrade to version 3.1.3.1 or apply the patch referenced in the project's advisory.<br />

CVE Not available<br />

ClamAV < 0.95.1 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4986 FAMILY: Web Clients RISK: HIGH NESSUS ID:36131<br />

Family Internet Services 1317

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!