27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

connect securely and do not introduce an unacceptable level of risk to the internal<br />

computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to corporate guidelines and policies.<br />

CVE Not available<br />

Coppermine Gallery < 1.3.4 displayimage.php HTML Injection<br />

<strong>PVS</strong> ID: 3178 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML Injection attack.\n\nThe remote<br />

host is running CopperMine Gallery, a set of PHP scripts to handle galleries of pictures.<br />

There is an injection flaw in this version of Coppermine Gallery. Specifically, the<br />

'displayimage.php' script does not properly sanitize user-supplied images prior to rendering.<br />

An attacker exploiting this flaw can run arbitrary code within the browser of unsuspecting<br />

users.<br />

Solution: Upgrade to version 1.3.4 or higher.<br />

CVE-2005-2676<br />

PHP-Kit Multiple SQL Injection Vulnerabilities<br />

<strong>PVS</strong> ID: 3179 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains scripts that are vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running PHP-Kit, an open-source content management<br />

system written in PHP. The remote version of this software is vulnerable to multiple SQL<br />

Injection flaws that may allow an attacker to execute arbitrary SQL statements against the<br />

remote database.<br />

Solution: The PHP-Kit project has been discontinued. All versions of PHP-Kit are vulnerable to a<br />

number of flaws. PHP-Kit is an absolute necessity within your environment, you will need<br />

to delegate resources to fix the security flaws and manage the code.<br />

CVE-2006-1773<br />

RunCMS Multiple SQL Injection Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3180 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running RunCMS, a web-based messaging system. This<br />

version of RunCMS is vulnerable to a remote SQL Injection flaw. An attacker exploiting<br />

this flaw would send specially formatted SQL commands to the web server. Successful<br />

exploitation would allow the attacker to run arbitrary commands on the remote database<br />

server.<br />

Family Internet Services 816

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!