27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: The remote client was just logged editing the following Wikipedia article: '%L'\nYou<br />

should ensure that such actions are in alignment with Corporate policies and guidelines.<br />

Solution: N/A<br />

CVE Not available<br />

Microsoft .NET Verbose Error Reporting Detection<br />

<strong>PVS</strong> ID: 5876 FAMILY: Policy<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host may give an attacker information useful for future<br />

attacks\n\nThe remote .NET server has enabled verbose error reporting. By default, such<br />

reports are only accessible via localhost (127.0.0.1). If enabled, remote attackers can gain<br />

useful information for future attacks. Information displayed includes: source code, stack<br />

trace, physical path of the application, error codes, and more. In addition, there have been<br />

flaws in the way that .NET 'ValidateRequest' handles malicious inputs. The request which<br />

generated the verbose error was: \n%P\n\nAnd the error was generated in: \n %L<br />

Solution: Disable verbose error reporting in .NET applications<br />

CVE Not available<br />

Web Server iFrame Source Hosted on 3rd-party Server<br />

<strong>PVS</strong> ID: 5877 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server has an iFrame tag which pulls its source from another web server.<br />

The iFrame in question is: %L\n\nThe location of the code which embeds this iFrame is:<br />

%P<br />

Solution: Ensure that the iFrame points to a web server which is a trusted site.<br />

CVE Not available<br />

Joomla! 1.6 < 1.6.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5878 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server has an application that is vulnerable to multiple<br />

attack vectors.\n\nThe remote web server is hosting Joomla!, a content management system<br />

written in PHP. For your information, the observed version of Joomla! is : \n %L<br />

.\n\nVersions of Joomla 1.6 earlier than 1.6.1 are potentially affected by multiple<br />

vulnerabilities : \n\n - An unspecified SQL injection and path disclosure issue.<br />

(20110201)\n\n - An uncaught exception could cause full path disclosure. (20110202)\n\n -<br />

Inadequate checking for double URI encoding could lead to cross-site scripting<br />

vulnerabilities. (20110203)\n\n - Inadequate filtering exposes cross-site scripting<br />

vulnerabilities. (20110204)\n\n - Inadequate access checking leads to information<br />

disclosure. (20110301)\n\n - There is inadequate checking of redirect URLs.<br />

Family Internet Services 1596

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!