27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis : \n\nThe remote web server is vulnerable to multiple attack vectors.\n\nThe<br />

remote web server is running Alkacon OpenCms, a web-based content management<br />

system. The installed version is earlier than 7.5.1. Such versions are potentially affected by<br />

multiple issues : \n\n - Multiple cross-site scripting issues.\n\n - Multiple SQL-injection<br />

issues.\n\n - Multiple input-validation vulnerabilities that allow 'phishing through frames'<br />

attacks.\n\n - Multiple input-validation vulnerabilities that may results in information<br />

disclosure.\n\nFor your information, the observed version of OpenCms is: \n %L<br />

Solution: Upgrade to OpenCms 7.5.1 or later.<br />

CVE Not available<br />

Achievo < 1.4.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5208 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server is hosting a PHP application that is vulnerable to<br />

multiple attack vectors.\n\nThe remote web server is hosting Achievo, a web-based<br />

resource management tool. The installed version of Achievo is earlier than 1.4.0. Such<br />

versions are potentially affected by multiple issues : \n\n - A persistent cross-site scripting<br />

vulnerability in the 'tittle' parameter of the scheduler module. (CVE-2009-2733)\n\n -<br />

Multiple cross-site scripting vulnerabilities in the 'atksearch[contractnumber]',<br />

'atksearch_AE_customer[customer]', and 'atksearchmode[contracttype]' parameters of the<br />

'Organisation Contracts' administration page. (CVE-2009-2733)\n\n - A SQL injection<br />

vulnerability exists in the 'user_id' parameter of the 'dispatch.php' script.<br />

(CVE-2009-2734)\n\n - A remote file-include vulnerability becuase the application fails to<br />

sufficiently sanitize user-supplied input to the 'config_atkroot' parameter of the<br />

'debugger.php' script.\n\nFor your information, the observed version of Achievo is: \n %L<br />

Solution: Upgrade to Achievo 1.4.0 or later, as this reportedly fixes the issue.<br />

CVE-2009-2734<br />

phpMyAdmin < 2.11.9.6 / 3.2.2.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5209 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server contains a PHP application that is vulnerable to<br />

multiple attack vectors.\n\nThe remote web server is running a version of phpMyAdmin<br />

earlier than 2.11.9.6 / 3.2.2.1. Such versions are potentially affected by multiple issues :<br />

\n\n - Unspecified cross-site scripting vulnerabilities.\n\n - Unspecified SQL Injection<br />

vulnerabilities.\n\nFor your information, the observed version of phpMyAdmin is: \n %L<br />

Solution: Upgrade to phpMyAdmin 2.11.9.6 or 3.2.2.1 or later.<br />

CVE-2009-3697<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

MapServer < 4.10.5/5.2.3/5.4.2 Integer Overflow Vulnerability<br />

<strong>PVS</strong> ID: 5210 FAMILY: CGI RISK: HIGH NESSUS ID:42262<br />

Family Internet Services 1387

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!