27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>PVS</strong> ID: 2825 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files.\n\nThe remote WebSphere web server is vulnerable to an information leak.<br />

There is a flaw in the way that WebSphere determines the web root directory based on the<br />

HTTP 'Host' tag. An application server that has its root web directory defined in the Web<br />

Servers root directory may disclose the source of .JSP files. JSP source code often contains<br />

information that is useful for further attacks. This version of WebSphere is also vulnerable<br />

to a remote Cross-Site Scripting (XSS) attack. An attacker exploiting this flaw would<br />

typically need to convince a user to browse to a malicious URI. Successful exploitation<br />

would result in the theft of confidential materials (such as authentication cookies).<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-1112<br />

Serendipity < 0.72 exit.php Multiple Parameter SQL Injection<br />

<strong>PVS</strong> ID: 2826 FAMILY: CGI RISK: LOW NESSUS ID:18155<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running Serendipity. Serendipity is a blogging software that is<br />

implemented in PHP. This version of Serendipity is vulnerable to a remote SQL Injection<br />

attack. Specifically, the 'url_id' parameter of the exit.php script does not properly parse out<br />

SQL reserved characters. An attacker exploiting this flaw would send a malformed query to<br />

the exit.php script. Successful exploitation would result in the attacker being able to read<br />

data, write data, and possibly execute arbitrary commands.<br />

Solution: Upgrade to version 0.72 or higher.<br />

CVE-2005-1448<br />

SPHPBlog search.php q Parameter XSS<br />

<strong>PVS</strong> ID: 2827 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18048<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is running SPHPBlog, an open source blog application\nwritten in<br />

PHP.\n\nDue to a lack of input validation bug, the remote version of this software can\nbe<br />

used to perform a cross-site scripting attack.<br />

Solution: No solution is known at this time.<br />

CVE-2005-1135<br />

IlohaMail < 0.8.14-RC3 read_message.php Multiple Field HTML Injection<br />

<strong>PVS</strong> ID: 2828 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18050<br />

Family Internet Services 729

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!