27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running PHPAUCTION, a web-based auction portal. This<br />

version of PHPAUCTION is vulnerable to multiple injection flaws. The application fails to<br />

properly sanitize user input and, consequently, is prone to remote attacks. The attacks<br />

include HTML injection as well as SQL injection. An attacker exploiting these flaws would<br />

only need to be able to send malformed HTTP requests to the application. Successful<br />

exploitation would result in possible database compromise or arbitrary code being executed<br />

either on the server or within an unsuspecting user's browser.<br />

Solution: No solution is known at this time.<br />

CVE-2005-2255<br />

Jinzora < 2.1 Multiple Scripts include_path Parameter Remote File Inclusion<br />

<strong>PVS</strong> ID: 3056 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18653<br />

Description: Synopsis :\n\nAttackers may be able to view or execute arbitrary PHP code.\n\nThe remote<br />

host is running Jinzora, a web-based media streaming and management system written in<br />

PHP. The installed version of Jinzora allows remote attackers to control the 'include_path'<br />

variable used when including PHP code in several of the application's scripts. By<br />

leveraging this flaw, an attacker may be able to view arbitrary files on the remote host and<br />

execute arbitrary PHP code, possibly taken from third-party hosts.<br />

Solution: Upgrade to version 2.1 or higher.<br />

CVE-2005-2249<br />

Apache Webserver Valid Banner Check<br />

<strong>PVS</strong> ID: 3057 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: Ensure some level of integrity for the web banners being presented.<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

punBB < 1.2.6 profile.php $temp Parameter SQL Injection<br />

<strong>PVS</strong> ID: 3058 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running punBB, a web-based bulletin board. This version of<br />

punBB ( %L ) is vulnerable to a remote SQL Injection attack. Due to a content-parsing<br />

flaw, attackers can inject SQL commands into the 'change_email' parameter of the<br />

profile.php script. An attacker exploiting this flaw would only need to be able to send<br />

HTTP requests to the application. Successful exploitation would result in the attacker<br />

having the ability to read or write to the database. In addition, the attacker may be able to<br />

execute arbitrary commands on the remote system.<br />

Family Internet Services 781

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!