27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CVE-2001-0098<br />

WebLogic Internal Management Servlet Authentication Bypass<br />

<strong>PVS</strong> ID: 1455 FAMILY: Web Servers RISK: HIGH NESSUS ID:11486<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw which allows for the bypassing of<br />

authentication.\n\nThe remote web server is an unpatched version of WebLogic. This<br />

version has an internal management servlet which does not properly check the user<br />

credentials and can be accessed from the outside, allowing an attacker to change the<br />

passwords of the users or even to upload or download any file on the remote server.<br />

Solution: Apply SP2 rolling patch 3 on WebLogic 6.0, service pack 4 on WebLogic 6.1 and SP2 on<br />

WebLogic 7.0<br />

CVE-2003-0151<br />

vqServer < 1.9.30 Directory Traversal File Access<br />

<strong>PVS</strong> ID: 1456 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a directory traversal flaw.\n\nThe remote<br />

web server (vqServer) is vulnerable to a directory traversal bug which may allow attackers<br />

to read arbitrary files on the remote host.<br />

Solution: Upgrade to version 1.9.30 or higher.<br />

CVE-2000-0240<br />

VisualRoute Web Server Detection<br />

<strong>PVS</strong> ID: 1457 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10744<br />

Description: Synopsis :\n\nThe remote application allows attackers to 'bounce' attacks against other<br />

networks.\n\nThe remote host is running VisualRoute, a web server allowing anyone to<br />

perform a traceroute interactively. An attacker may use this interface to perform traceroutes<br />

on third party hosts without being noticed, therefore using a VisualRoute server as a relay<br />

for their discoveries.<br />

Solution: Disable this server if you do not use it, or block its access on the firewall<br />

CVE Not available<br />

Vignette StoryServer Cross-user Session Information Disclosure<br />

<strong>PVS</strong> ID: 1458 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11526<br />

Family Internet Services 375

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!