27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>PVS</strong> ID: 2806 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw which allows attackers to retrieve<br />

sensitive files.\n\nThe remote host is running Macromedia ColdFusion, a web application<br />

server. This version of Macromedia is vulnerable to a flaw in the way that it stores its class<br />

files. Specifically, a flaw in the Macromedia ColdFusion MX Updater causes compiled<br />

Java classes to be stored in the '/WEB-INF/cfclasses' directory. A remote attacker can<br />

retrieve the files and run a Java decompiler in order to decompile the binary code into<br />

human-readable format.<br />

Solution: Upgrade to ColdFusion 7.0 MX or higher.. There is also a workaround available for version<br />

6.1.<br />

CVE Not available<br />

punBB < 1.2.5 profile.php SQL Injection<br />

<strong>PVS</strong> ID: 2807 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18005<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running punBB, a web-based bulletin board. This version of<br />

punBB ( %L ) is vulnerable to a SQL injection attack. Due to a content-parsing flaw,<br />

attackers can inject SQL commands into the 'change_email' parameter of the profile.php<br />

script. An attacker exploiting this flaw would only need to be able to send HTTP requests<br />

to the application. Successful exploitation would result in the attacker having the ability to<br />

read or write to the database. In addition, the attacker may be able to execute arbitrary<br />

commands on the remote system.<br />

Solution: Upgrade to version 1.2.5 or higher.<br />

CVE-2005-1051<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

PostNuke < 0.760 RC4 Multiple XSS and SQL Injection Vulnerabilities<br />

<strong>PVS</strong> ID: 2808 FAMILY: CGI RISK: HIGH NESSUS ID:18360<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running PostNuke version 0.760 RC3 or older. This version<br />

of PostNuke is vulnerable to a remote Cross-Site Scripting (XSS) flaw. Specifically, failure<br />

to parse malicious input to the 'op' parameter of the user.php script or the 'module'<br />

parameter of the admin.php script can lead to the injection of script code. An attacker<br />

exploiting this flaw would need to be able to entice the victim into browsing a malicious<br />

URI. Successful exploitation would result in the attacker being able to inject arbitrary script<br />

code into the browser of the unsuspecting user. This can lead to disclosure of confidential<br />

information. In addition, the remote host is vulnerable to a remote SQL Injection attack. An<br />

attacker exploiting this flaw would be able to read/write confidential database data.<br />

Solution: Upgrade to version 0.760 RC4 or higher.<br />

Family Internet Services 723

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!