27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

(20110302)\n\n - Inadequate filtering causes information disclosure. (20110303)\n\n -<br />

There is inadequate control of which files can be edited by authenticated users.<br />

(20110304)\n\n - Inadequate token checking leads to a cross-site request forgery<br />

vulnerability. (20110305)\n\n - Editor caching can cause a denial of service by filling up<br />

the disk. (20110306)\n\n - Inadequate filtering exposes cross-site scripting vulnerabilities.<br />

(20110307)\n\n - Inadequate token checking leads to a cross-site request forgery<br />

vulnerability. (20110308)<br />

Solution: Upgrade to Joomla! 1.6.1 or later.<br />

CVE Not available<br />

MyBB < 1.4.15 / 1.6 < 1.6.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5879 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:53288<br />

Description: Synopsis : \n\nThe remote web server is running a PHP application that is vulnerable to<br />

multiple attack vectors.\n\nThe remote web server hosts MyBB, a web-based discussion<br />

board application. For your information, the observed version of MyBB is : \n %L<br />

\n\nVersions of MyBB earlier than 1.4.15, or 1.6.x earlier than 1.6.2 are potentially affected<br />

by multiple issues : \n\n - A cross-site scripting vulnerability exists in the modcp.php script.<br />

(1464)\n\n - A cross-site scripting vulnerabililty exists in the 'xmlhttp.php' script.<br />

(1460)\n\n - A cross-site scripting issue exists relating to HTML content in posts. (1422)<br />

Solution: Upgrade to MyBB 1.4.15, 1.6.2, or later.<br />

CVE Not available<br />

LizaMoon Malware Detection<br />

<strong>PVS</strong> ID: 5880 FAMILY: CGI RISK: HIGH NESSUS ID:29871<br />

Description: Synopsis :\n\nThe remote web server seems to have been compromised by<br />

LizaMoon.\n\nThe remote web site seems to link to malicious javascript files hosted on a<br />

third party web site related to the LizaMoon Malware. This typically means that the remote<br />

web site has been compromised, likely through SQL injection, and it may infect its visitors<br />

as well.<br />

Solution: Restore your website to its original state and audit your dynamic pages for SQL injection<br />

vulnerabilities.<br />

CVE Not available<br />

Joomla! 1.5 < 1.5.23 Information Disclosure Vulnerability<br />

<strong>PVS</strong> ID: 5881 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 1597

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!