27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Tor Tunnel Detection<br />

<strong>PVS</strong> ID: 2543 FAMILY: Policy RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote client is routing network traffic over the Tor Tunnel<br />

network. The Tor tunnel allows users to run applications such as peer-to-peer clients,<br />

instant messaging, web browsers over a single encrypted HTTP tunnel. Tor also tunnels<br />

and encrypts the DNS requests associated with such applications. By sending traffic over<br />

the Tor network, users can bypass corporate policies, firewalls, and guidelines.<br />

Solution: Ensure that the usage of the Tor network is in alignment with corporate polices and<br />

guidelines.<br />

CVE Not available<br />

CMSimple < 2.4 Beta 5 Multiple Remote Input Validation Vulnerabilities<br />

<strong>PVS</strong> ID: 2544 FAMILY: CGI RISK: LOW NESSUS ID:19693<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML injection attack.\n\nThe remote<br />

host is running a version of CMSimple, a content management system. The remote version<br />

of this software is prone to multiple input validation vulnerabilities. An attacker may<br />

exploit these flaws to inject arbitrary code to steal authentication cookies.<br />

Solution: Upgrade to CMSimple 2.4 Beta 5 or higher.<br />

CVE Not available<br />

Siteman < 1.1.11 Page User Database Privilege Escalation<br />

<strong>PVS</strong> ID: 2545 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:16216<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running Siteman, a web-based content management<br />

system written in PHP. The remote version of this software is vulnerable to a privilege<br />

escalation vulnerability. An attacker with a valid username and password may escalate<br />

privileges by making a specially crafted request to the remote server.<br />

Solution: Upgrade to SiteMan 1.1.11 or higher.<br />

CVE-2005-0305<br />

ExBB Nested BBcode XSS<br />

<strong>PVS</strong> ID: 2546 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:16223<br />

Family Internet Services 648

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!