27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

potential leaking of confidential data which may lead to a more sophisticated future attack.<br />

Solution: No solution is known at this time.<br />

CVE-2005-0837<br />

CoolForum SQL and XSS Vulnerabilities<br />

<strong>PVS</strong> ID: 2725 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17597<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running CoolForum, a bulletin board written in PHP. This<br />

version of CoolForum is vulnerable to at least two (2) remote attacks. Specifically, a SQL<br />

injection attack affects the 'entete.php' and 'register.php' scripts. An attacker exploiting<br />

these flaws would send a malformed query to the questionable scripts. A successful exploit<br />

would result in the reading and writing of confidential data. In addition, the attacker may be<br />

able to execute arbitrary code on the remote webserver.\n\nMultiple HTML injection and<br />

Cross-Site Scripting (XSS) flaws have also been reported to exist within this version of<br />

CoolForum. An attacker exploiting these flaws would typically need to be able to convince<br />

a user to browse a malicious URI. A successful attack would result in the theft of<br />

potentially confidential client data (cookies, authentication credentials, and more) or<br />

malicious code being executed within the client browser.<br />

Solution: Upgrade to version 0.8.1 or higher.<br />

CVE-2005-0857<br />

PHP-Fusion < 5.0.2 setuser.php HTML Injection Vulnerability<br />

<strong>PVS</strong> ID: 2726 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML injection attack.\n\nThe remote<br />

host is running a version of PHP-Fusion that is vulnerable to an HTML injection flaw.<br />

Specifically, the setuser.php script fails to properly sanitize input data via the 'user_name'<br />

and 'user_pass' parameters. An attacker exploiting this flaw would typically need to be able<br />

to convince a remote user to browse to a malicious URI. A successful attack would yield<br />

potentially confidential data (cookies, credentials) as well as potentially execute malicious<br />

code within the context of the vulnerable server.<br />

Solution: Upgrade to version 5.0.2 or higher.<br />

CVE Not available<br />

Panasonic Camera Detection<br />

<strong>PVS</strong> ID: 2727 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 701

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!