27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CVE-2005-1009<br />

Woppoware Postmaster < 4.2.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2896 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18246<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Woppoware Postmaster, a suite of products that allows users to surf the web via<br />

a proxy, connect to email accounts via a web interface, send and receive email, and<br />

remotely administer the services. This version of Postmaster is reported to be vulnerable to<br />

a number of flaws. An attacker exploiting these flaws would be able to gain access to<br />

confidential data, compromise the integrity of the machine, and impact the availability of<br />

the services.<br />

Solution: Upgrade to version 4.2.3 or higher.<br />

CVE-2005-1652<br />

BoastMachine < 3.1 users.inc.php Arbitrary File Upload<br />

<strong>PVS</strong> ID: 2897 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18247<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a 'file upload' flaw.\n\nThe remote host is<br />

running BoastMachine, a blogging software. This version of BoastMachine is vulnerable to<br />

a flaw in the users.inc.php script. Specifically, a remote user can pass a specially formatted<br />

HTTP request to the BoastMachine script and cause it to upload unsafe files. After upload,<br />

the attacker can then execute the files with the permissions of the web server. In addition,<br />

the attacker can leave malicious scripts that are executed by unsuspecting users who browse<br />

the web page.<br />

Solution: Upgrade to version 3.1 or higher.<br />

CVE-2005-1580<br />

MaxWebPortal < 1.360 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2898 FAMILY: CGI RISK: NONE NESSUS ID:18248<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nMaxWebPortal is<br />

a web portal that utilizes a backend SQL or MySQL database. This version of<br />

MaxWebPortal is vulnerable to multiple flaws that include: HTML injection, cross-site<br />

scripting (XSS) and SQL Injection. An attacker exploiting these flaws would only need to<br />

be able to send HTTP queries to the remote application. A successful attack would give the<br />

attacker the ability to read and write database data as well as potentially execute arbitrary<br />

remote commands on the database server. The HTML injection and XSS flaws would<br />

typically require that the attacker be able to coerce a user into browsing to a malicious URI.<br />

Successful exploitation would result in arbitrary code executing in the client browser and<br />

possible theft of confidential data (such as authentication cookies).<br />

Family Internet Services 750

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!