27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: Upgrade to version 0.48 or higher.<br />

CVE-2005-0608<br />

FCKeditor with PHPNuke connector.php File Upload<br />

<strong>PVS</strong> ID: 2661 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a 'file upload' flaw.\n\nThe remote<br />

host is running FCKeditor plugin for PHPNuke. FCKeditor is a web-based<br />

document editor. This version of FCKeditor is vulnerable to a flaw in the way that<br />

it verifies file extensions for file uploads. An attacker exploiting this flaw would be<br />

able to upload potentially malicious code to the web server that might, under certain<br />

circumstances, be executable via a remote HTTP request.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-0613<br />

PostNuke < 0.760 RC3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2662 FAMILY: CGI RISK: HIGH NESSUS ID:17240<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running PostNuke version 0.760 RC2 or older.<br />

These\nversions suffer from several vulnerabilities, among them :\n\n*) SQL injection<br />

vulnerability in the News, NS-Polls and\nNS-AddStory modules.\n*) SQL injection<br />

vulnerability in the Downloads module.\n*)Cross-site scripting vulnerabilities in the<br />

Downloads\nmodule.\n*) Possible path disclosure vulnerability in the News module.\n\nAn<br />

attacker may use the SQL injection vulnerabilities to obtain the\npassword hash for the<br />

administrator or to corrupt the \ndatabase used by PostNuke.\n\nExploiting the XSS flaws<br />

may enable an attacker to inject arbitrary\nscript code into the browser of site<br />

administrators leading to\ndisclosure of session cookies.\n\nThe remote host is running %L<br />

Solution: Upgrade to version 0.760 RC3 or higher.<br />

CVE-2005-0616<br />

phpCOIN 1.2.1b Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2663 FAMILY: CGI RISK: HIGH NESSUS ID:17246<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running phpCOIN version 1.2.1b or older. These\nversions<br />

suffer from several vulnerabilities, among them :\n\n*) Multiple SQL injection<br />

vulnerabilities.\nBy calling the 'faq' module with a specially crafted \n'faq_id' parameter or<br />

the 'pages' or 'site' modules with a \nspecially crafted 'id' parameter, a remote attacker may<br />

be\nable to manipulate SQL queries used by the program, thereby \nrevealing sensitive<br />

information or even corrupting the\ndatabase.\n\n*) Multiple cross-site scripting<br />

vulnerabilities.\nA remote attacker may be able to inject arbitrary code\ninto the 'helpdesk'<br />

and 'mail' modules as well as the\n'login.php' script by appending it to a valid<br />

Family Internet Services 681

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!