27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

or 'database.php' PHP scripts. Succesful exploitation would result in the attacker being able<br />

to read or write confidential data. In some instances, the attacker may be able to execute<br />

arbitrary code on the remote database server.<br />

Solution: Upgrade to version 2.7.1 or higher.<br />

CVE-2006-1094<br />

Apache mod_python < 3.2.8 Remote Command Execution<br />

<strong>PVS</strong> ID: 3453 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an flaw that allows attackers to execute<br />

arbitrary commands.\n\nThe remote Apache server is running a version of mod_python that<br />

is equal to 3.2.7. It is reported that a flaw was introduced with version 3.2.7. Specifically, if<br />

'FileSession' has been enabled, a remote attacker can send a specially formatted session<br />

cookie that will, upon being parsed, force mod_python into executing arbitrary code. The<br />

exact details of the flaw are unknown.<br />

Solution: Upgrade to version 3.2.8, 3.3.1 or higher.<br />

CVE-2006-1095<br />

vBulletin < 3.5.4 HTML Injection<br />

<strong>PVS</strong> ID: 3454 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML Injection attack.\n\nThe version<br />

of vBulletin installed on the remote host fails to properly sanitize user-supplied input.<br />

Given this, the application is prone to an HTML injection attack. An attacker exploiting<br />

this flaw would post a malicious entry to the vBulletin board. Unsuspecting users perusing<br />

the board would have code executed within their browser. Successful exploitation could<br />

lead to the theft of confidential data.<br />

Solution: Upgrade to version 3.5.4 or higher.<br />

CVE-2006-1040<br />

RaidenHTTPd < 1.1.48 Crafted Request Script Source Disclosure<br />

<strong>PVS</strong> ID: 3455 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running RaidenHTTPd. RaidenHTTPd is a<br />

web server that is designed for the Microsoft platform. This version of RaidenHTTPd is<br />

vulnerable to a flaw where an attacker can send a malformed 'GET' request that will, upon<br />

being parsed, cause the Raiden web server to send back potentially confidential files (such<br />

as source code for active scripts).<br />

Family Internet Services 889

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!