27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: Ensure that this application is authorized according to corporate policies and guidelines.<br />

CVE Not available<br />

Mambo / Joomla Component / Module mosConfig_absolute_path Parameter Remote File Inclusion<br />

<strong>PVS</strong> ID: 3687 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:22049<br />

Description: Synopsis :\n\nThe remote web server contains a PHP application that is prone to remote file<br />

inclusion attacks.\n\nThe remote host contains a third-party Mambo / Joomla component or<br />

module. The version of at least one such component or module installed on the remote host<br />

fails to sanitize input to the 'mosConfig_absolute_path' parameter before using it to include<br />

PHP code. Provided PHP's 'register_globals' setting is enabled, an unauthenticated attacker<br />

may be able to exploit these flaws to view arbitrary files on the remote host or to execute<br />

arbitrary PHP code, possibly taken from third-party hosts.<br />

Solution: Disable PHP's 'register_globals' setting. Upgrade or patch according to vendor<br />

recommendations.<br />

CVE-2006-6962<br />

IceWarp < 5.6.1 lang_settings Parameter Remote File Inclusion<br />

<strong>PVS</strong> ID: 3688 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:22079<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Script Injection attack.\n\nThe remote host<br />

is running IceWarp Web Mail, a webmail product written in PHP that is distributed as a<br />

standalone application and also bundled with VisNetic Mail Server and Merak Mail Server.<br />

The version of IceWarp Web Mail installed on the remote host fails to sanitize<br />

user-supplied input to the 'lang_settings' parameter of the 'accounts/inc/include.php' and<br />

'admin/inc/include.php' scripts before using it to include PHP code. An unauthenticated<br />

attacker may be able to exploit these flaws to view arbitrary files on the remote host or to<br />

execute arbitrary PHP code after injecting it into the mail server's log file.<br />

Solution: Upgrade to version 5.6.1 or higher.<br />

CVE-2006-0818<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

MyBB < 1.1.6 HTTP Header CLIENT-IP Field SQL Injection<br />

<strong>PVS</strong> ID: 3689 FAMILY: CGI RISK: HIGH NESSUS ID:22055<br />

Description: Synopsis :\n\nThe remote web server contains a PHP application that is susceptible to a<br />

SQL injection attack.\n\nThe remote version of MyBB fails to sanitize input to the<br />

'CLIENT-IP' request header before using it in a database query when initiating a sesion in<br />

'inc/class_session.php'. This may allow an unauthenticated attacker to uncover sensitive<br />

information such as password hashes, modify data, launch attacks against the underlying<br />

database, and more. Note that successful exploitation is possible regardless of PHP's<br />

settings.<br />

Family Internet Services 953

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!