27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

email message. Successful exploitation would lead to a Denial of Service or remote code<br />

execution.<br />

Solution: Upgrade to version 1.0.4, 1.9.5 or higher.<br />

CVE-2005-0926<br />

PhotoPost < 5.02 RC3 Multiple Content-parsing Vulnerabilities<br />

<strong>PVS</strong> ID: 2778 FAMILY: CGI RISK: HIGH NESSUS ID:17649<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running PhotoPost, a web-based image gallery written in<br />

PHP. This version of PhotoPost is reported vulnerable to multiple vulnerabilities. Multiple<br />

scripts are reported prone to a Cross-Site Scripting (XSS) vulnerability. Exploiting the XSS<br />

flaws may enable an attacker to inject arbitrary script code into the browser of unsuspecting<br />

users. A successful attack would potentially allow the attacker the ability to view<br />

confidential data (cookies, authentication data, and more) or compromise the integrity of<br />

the local system via the web browser. A second set of issues also affect multiple scripts.<br />

Specifically, multiple scripts are vulnerable to a remote SQL injection attack. An attacker<br />

exploiting this flaw would be able to view and modify database data as well as potentially<br />

execute arbitrary commands.<br />

Solution: Upgrade to PhotoPost 5.02 Release Candidate 3 or higher.<br />

CVE-2005-0928<br />

Horde < 3.0.4 Parent Page Title XSS<br />

<strong>PVS</strong> ID: 2779 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17650<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

version of Horde installed on the remote host suffers from a cross-site scripting<br />

vulnerability in which an attacker can inject arbitrary HTML and script code via the page<br />

title of a parent frame, enabling him to steal cookie-based authentication credentials and<br />

perform other such attacks.<br />

Solution: Upgrade to version 3.0.4 or higher.<br />

CVE-2005-0961<br />

MailReader < 2.3.36 network.cgi MIME Message XSS<br />

<strong>PVS</strong> ID: 2780 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17657<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML injection attack.\n\nThe remote<br />

host is running Mailreader, a web-based application which can be used to read email. This<br />

version of Mailreader is vulnerable to a remote HTML injection flaw. An attacker<br />

exploiting this flaw would need to be able to convince a Mailreader user to open a<br />

Family Internet Services 715

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!