27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: The remote host is running a copy of PHP-Nuke. Given the history of this package, we<br />

recommend that you do not use it, as security was not important to the authors of the<br />

software. The author of PHP-Nuke (Francisco Burzi) even started to rewrite the program<br />

from scratch, given the huge number of vulnerabilities.<br />

Solution: Do not use this software.<br />

CVE-2005-0434<br />

phpinfo() Function Information Disclosure<br />

<strong>PVS</strong> ID: 1592 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11229<br />

Description: The remote host seems to have a PHP page that calls the phpinfo() function. A call to this<br />

function should be avoided as it provides information about this host to an attacker. The<br />

request which triggered the viewing of a phpinfo() file was : \n%P<br />

Solution: Delete this file.<br />

CVE Not available<br />

Oracle 9iAS SOAP Default Configuration Unauthenticated Application Deployment<br />

<strong>PVS</strong> ID: 1593 FAMILY: Web Servers RISK: HIGH NESSUS ID:11227<br />

Description: In a default installation of Oracle 9iAS v.1.0.2.2, it is possible to deploy or undeploy SOAP<br />

services without the need of any kind of credentials. This is due to SOAP being enabled by<br />

default after installation in order to provide a convenient way to use SOAP samples.<br />

However, this feature poses a threat to HTTP servers with public access since remote<br />

attackers can create SOAP services and then invoke them remotely. Since SOAP services<br />

can contain arbitrary Java code in Oracle 9iAS this means that an attacker can execute<br />

arbitrary code in the remote server.<br />

Solution: Disable SOAP.<br />

CVE-2001-1371<br />

Oracle 9iAS .JSP File Request Default Error Information Disclosure<br />

<strong>PVS</strong> ID: 1594 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11226<br />

Description: Oracle 9iAS allows remote attackers to obtain the physical path of a file under the server<br />

root via a request for a non-existent .JSP file. The default error generated leaks the<br />

pathname in an error message.<br />

Solution: Ensure that virtual paths of URL is different from the actual directory path. Also, do not<br />

use the directory in 'ApJServMount ' to<br />

store data or files.<br />

Family Internet Services 409

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!