27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running Nagios, an open-source application that allows<br />

administrators to track the availability of network hosts.<br />

Solution: Ensure that Nagios is only accessible from trusted IP ranges, running the latest version, and<br />

requires strong authentication.<br />

CVE Not available<br />

IBM WebSphere < 6.0.2.3 Authentication Bypass<br />

<strong>PVS</strong> ID: 3559 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote WebSphere web server is vulnerable to an<br />

information leak. There is a flaw in the way that WebSphere processes filtered requests<br />

which end with a '/'. For instance, if the file test.jsp required authentication, an attacker<br />

could simply request test.jsp/ and retrieve the page.<br />

Solution: Upgrade to version 6.0.2.3 or higher.<br />

CVE-2006-2342<br />

PHP-Fusion < 6.00.307 Local File Inclusion<br />

<strong>PVS</strong> ID: 3560 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nAccording to its version number, the remote host is running a<br />

version of PHP-Fusion that suffers from a flaw where remote attackers can specify arbitrary<br />

'include' files which will be retrieved and displayed by the web server. An attacker<br />

exploiting this flaw would simply need to supply '../' to the PHP-Fusion<br />

application. Successful exploitation would result in the attacker gaining access to<br />

confidential data.<br />

Solution: Upgrade to version 6.00.307 or higher.<br />

MyBB <<br />

CVE-2006-2331<br />

<strong>PVS</strong> ID: 3561 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote<br />

version of MyBB does not properly parse user-supplied input to the showthread.php script.<br />

An attacker can pass data to showthread.php such that, upon parsing, the web server is<br />

tricked into sending a malformed SQL query to the backend database. Successful<br />

exploitation results in the attacker executing arbitrary SQL commands on the database.<br />

Family Internet Services 915

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!