27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

punBB < 1.2.2 Multiple SQL Injection and Authentication Bypass Vulnerabilities<br />

<strong>PVS</strong> ID: 2651 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running punBB, a web-based bulletin board. punBB works in<br />

conjunction with a SQL database. This version of punBB is vulnerable to several SQL<br />

injection flaws as well as an authentication bypass flaw. An attacker exploiting these flaws<br />

would only need to be able to send HTTP traffic to the web server. A successful SQL<br />

injection attack would give the attacker the ability to execute commands on the SQL server,<br />

view data, and modify data. A successful authentication bypass attack would give the<br />

attacker the ability to perform administrative tasks on the web server.<br />

Solution: Upgrade to version 1.2.2 or higher.<br />

CVE-2005-0570<br />

Firefox < 1.0.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2652 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17603<br />

Description: Synopsis : \n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is using Firefox. The remote version of this software contains the following<br />

security flaws: \n1) There is a flaw in the way that the browser handle scripting within<br />

'tabbed' cross-domains. An attacker exploiting this flaw would need to be able to coerce a<br />

user into clicking on a malicious URL which would then open a separate 'TAB' within the<br />

browser. The attacker could then retrieve data relevant to other tabbed connections or<br />

execute code locally.\n2)There is a flaw in the default about: config script that would allow<br />

an attacker to modify configuration data. In order to execute such an attack, the attacker<br />

would need to be able to entice the user into visiting or clicking on a malicious URL. A<br />

successful attacker would be able to modify the local configuration file, resulting in<br />

enhanced access rights or other potential exploits. The reported browser version (as seen on<br />

the network) is: \n %L<br />

Solution: Upgrade to Firefox 1.0.1 or higher.<br />

CVE-2005-0231<br />

Brooky CubeCart < 2.0.6 settings.inc.php XSS<br />

<strong>PVS</strong> ID: 2653 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is using Brooky CubeCart, an online storefront application written in PHP.<br />

This version of CubeCart is vulnerable to a Cross-Site Scripting (XSS) flaw within the<br />

default parser. An attacker exploiting these flaws would be need to be able to convince a<br />

user to click on a malicious URL. Upon successful exploitation, the attacker would be able<br />

to steal credentials or execute code within the browser.<br />

Solution: Upgrade to version 2.0.6 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 678

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!