A Specimen of Network Security Scan Report
A Specimen of Network Security Scan Report
com
scanners. Secure your Attack Surface with our vulnerability discovery and
This report was autogenerated using the open source OpenVAS Vulnerability Scanner.
CONFIDENTIAL - This report contains sensitive information and should be stored in a secure location
OpenVas Vulnerability Report HackerTarget.com
Table of Contents
Vulnerability Summary 3
Results by Host 5
Host 192.168.1.109 5
Summary
Scan started: Wed Feb 13 00:47:29 2019 UTC
Scan ended: Wed Feb 13 01:09:37 2019 UTC
Host Summary
Total: 1 18 36 3 0
Vulnerability Summary
Results by Host
Host 192.168.1.109
Host scan started: Wed Feb 13 00:47:44 2019 UTC
22/tcp High
1524/tcp High
3306/tcp High
3632/tcp High
5900/tcp High
6200/tcp High
23/tcp Medium
80/tcp High
2121/tcp Medium
general/tcp High
6667/tcp High
21/tcp High
8787/tcp High
1099/tcp High
25/tcp Medium
5432/tcp High
513/tcp High
445/tcp Medium
OpenVas Vulnerability Report HackerTarget.com
Summary
The host is running TWiki and is prone to Cross-Site Scripting (XSS) and Command Execution Vulnerabilities.
Impact
Successful exploitation could allow execution of arbitrary script code or commands. This could let attackers steal
cookie-based authentication credentials or compromise the affected application.
Solution
Affected Software/OS
Vulnerability Insight
- %URLPARAM{}% variable is not properly sanitized which lets attackers conduct cross-site scripting attack.
- %SEARCH{}% variable is not properly sanitised before being used in an eval() call which lets the attackers
execute perl code through eval injection attack.
Product: cpe:/a:twiki:twiki:01.Feb.2003
Method: TWiki Version Detection (OID: 1.3.6.1.4.1.25623.1.0.800399)
References
Summary
The Operating System on the remote host has reached the end of life and should not be used anymore.
The "Ubuntu" Operating System on the remote host has reached the end of life.
CPE: cpe:/o:canonical:ubuntu_linux:8.04
Installed version,
build or SP: 8.04
EOL date: 2013-05-09
EOL info: https://wiki.ubuntu.com/Releases
Solution
Product: cpe:/o:canonical:ubuntu_linux:8.04
Method: OS Detection Consolidation and Reporting (OID: 1.3.6.1.4.1.25623.1.0.105937)
OpenVas Vulnerability Report HackerTarget.com
Systems using Distributed Ruby (dRuby/DRb), which is available in Ruby versions 1.6 and later, may permit
unauthorized systems to execute distributed commands.
The service is running in $SAFE >= 1 mode. However it is still possible to run arbitrary syscall commands on the
remote host. Sending an invalid syscall the service returned the following response:
Flo:Errno::ENOSYS:bt["3/usr/lib/ruby/1.8/drb/drb.rb:1555:in `syscall'"0/usr/lib/ruby/1.8/drb/drb.rb:1555:in
`send'"4/usr/lib/ruby/1.8/drb/drb.rb:1555:in `__send__'"A/usr/lib/ruby/1.8/drb/drb.rb:1555:in
`perform_without_block'"3/usr/lib/ruby/1.8/drb/drb.rb:1515:in `perform'"5/usr/lib/ruby/1.8/drb/drb.rb:1589:in
`main_loop'"0/usr/lib/ruby/1.8/drb/drb.rb:1585:in `loop'"5/usr/lib/ruby/1.8/drb/drb.rb:1585:in
`main_loop'"1/usr/lib/ruby/1.8/drb/drb.rb:1581:in `start'"5/usr/lib/ruby/1.8/drb/drb.rb:1581:in
`main_loop'"//usr/lib/ruby/1.8/drb/drb.rb:1430:in `run'"1/usr/lib/ruby/1.8/drb/drb.rb:1427:in
`start'"//usr/lib/ruby/1.8/drb/drb.rb:1427:in `run'"6/usr/lib/ruby/1.8/drb/drb.rb:1347:in
`initialize'"//usr/lib/ruby/1.8/drb/drb.rb:1627:in `new'"9/usr/lib/ruby/1.8/drb/drb.rb:1627:in
`start_service'"%/usr/sbin/druby_timeserver.rb:12:errnoi+:mesg"Function not implemented
Impact
By default, Distributed Ruby does not impose restrictions on allowed hosts or set the $SAFE environment variable
to prevent privileged activities. If other controls are not in place, especially if the Distributed Ruby process runs
with elevated privileges, an attacker could execute arbitrary system commands or Ruby scripts on the
Distributed Ruby server. An attacker may need to know only the URI of the listening Distributed Ruby server to
submit Ruby commands.
Solution
Administrators of environments that rely on Distributed Ruby should ensure that appropriate controls are in
place. Code-level controls may include:
- Setting $SAFE levels appropriately (>=2 is recommended if untrusted hosts are allowed to submit Ruby
commands, and >=3 may be appropriate)
Send a crafted command to the service and check for a remote command execution via the instance_eval or
syscall requests.
Details: Distributed Ruby (dRuby/DRb) Multiple Remote Code Execution Vulnerabilities (OID:
1.3.6.1.4.1.25623.1.0.108010)
References
BID: 47071
Other: https://tools.cisco.com/security/center/viewAlert.x?alertId=22750
http://www.securityfocus.com/bid/47071
http://blog.recurity-labs.com/archives/2011/05/12/druby_for_penetration_testers/
http://www.ruby-doc.org/stdlib-1.9.3/libdoc/drb/rdoc/DRb.html
OpenVas Vulnerability Report HackerTarget.com
Multiple Java products that implement the RMI Server contain a vulnerability that could allow an unauthenticated,
remote attacker to execute arbitrary code on a targeted system with elevated privileges.
Solution
Disable class-loading.
Vulnerability Insight
The vulnerability exists because of an incorrect default configuration of the Remote Method Invocation (RMI)
Server in the affected software. An unauthenticated, remote attacker could exploit the vulnerability by
transmitting crafted packets to the affected software. When the packets are processed, the attacker could
execute arbitrary code on the system with elevated privileges.
Check if the target tries to load a Java class via a remote HTTP URL.
Details: Java RMI Server Insecure Default Configuration Remote Code Execution Vulnerabil... (OID:
1.3.6.1.4.1.25623.1.0.140051)
References
Other: https://tools.cisco.com/security/center/viewAlert.x?alertId=23665
OpenVas Vulnerability Report HackerTarget.com
The service is answering to an 'id;' command with the following response: uid=0(root) gid=0(root)
Impact
Attackers can exploit this issue to execute arbitrary commands in the context of the application. Successful
attacks will compromise the affected isystem.
Solution
DistCC 2.x, as used in XCode 1.5 and others, when not configured to restrict access to the server port, allows
remote attackers to execute arbitrary commands via compilation jobs, which are executed by the server without
authorization checks.
Impact
DistCC by default trusts its clients completely that in turn could allow a malicious client to execute arbitrary
commands on the server.
Solution
Vendor updates are available. Please see the references for more information.
References
CVE: CVE-2004-2687
Other: https://distcc.github.io/security.html
https://web.archive.org/web/20150511045306/http://archives.neohapsis.com:80/archives/bugtraq/2005-
03/0183.html
OpenVas Vulnerability Report HackerTarget.com
Summary
It was possible to login into the remote MySQL as root using weak credentials.
Solution
Product: cpe:/a:mysql:mysql:5.0.51a
Method: MySQL/MariaDB Detection (OID: 1.3.6.1.4.1.25623.1.0.100152)
OpenVas Vulnerability Report HackerTarget.com
Summary
It was possible to login into the remote PostgreSQL as user postgres using weak credentials.
Solution
Product: cpe:/a:postgresql:postgresql:8.3.1
Method: PostgreSQL Detection (OID: 1.3.6.1.4.1.25623.1.0.100151)
OpenVas Vulnerability Report HackerTarget.com
It was possible to connect to the VNC server with the password: password
Solution
Change the password to something hard to guess or enable password protection at all.
Vulnerability Insight
This script tries to authenticate to a VNC server with the passwords set in the password preference. It will also
test and report if no authentication / password is required at all.
Note: Some VNC servers have a blacklisting scheme that blocks IP addresses after five unsuccessful connection
attempts for a period of time. The script will abort the brute force attack if it encounters that it gets blocked.
Solution
Disable the rlogin service and use alternatives like SSH instead.
Vulnerability Insight
- .rlogin (or .rhosts) file is easy to misuse (potentially allowing anyone to login without a password)
References
Other: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0651
http://en.wikipedia.org/wiki/Rlogin
http://www.ietf.org/rfc/rfc1282.txt
OpenVas Vulnerability Report HackerTarget.com
Many PHP installation tutorials instruct the user to create a file called phpinfo.php or similar containing the
phpinfo() statement. Such a file is often left back in the webserver directory.
The following files are calling the function phpinfo() which disclose potentially sensitive information:
http://192.168.1.109/mutillidae/phpinfo.php
http://192.168.1.109/phpinfo.php
Impact
Some of the information that can be gathered from this file includes:
The username of the user running the PHP process, if it is a sudo user, the IP address of the host, the web server
version, the system version (Unix, Linux, Windows, ...), and the root directory of the web server.
Solution
Impact
Exploiting these issues could allow an attacker to compromise the application, access or modify data, exploit
latent vulnerabilities in the underlying database, and gain unauthorized access to the affected application. Other
attacks are also possible.
Solution
The vendor has released an advisory and fixes. Please see the references for details.
Affected Software/OS
Details: Tiki Wiki CMS Groupware < 4.2 Multiple Unspecified Vulnerabilities (OID: 1.3.6.1.4.1.25623.1.0.100537)
Product: cpe:/a:tiki:tikiwiki_cms/groupware:1.9.5
Method: Tiki Wiki CMS Groupware Version Detection (OID: 1.3.6.1.4.1.25623.1.0.901001)
References
Impact
Exploiting this issue allows remote attackers to view the source code of files in the context of the server process.
This may allow the attacker to obtain sensitive information and to run arbitrary PHP code on the affected
computer. Other attacks are also possible.
Solution
PHP has released version 5.4.3 and 5.3.13 to address this vulnerability. PHP is recommending that users upgrade
to the latest version of PHP.
Vulnerability Insight
When PHP is used in a CGI-based setup (such as Apache's mod_cgid), the php-cgi receives a processed query
string parameter as command line arguments which allows command-line switches, such as -s, -d or -c to be
passed to the php-cgi binary, which can be exploited to disclose source code and obtain arbitrary code
execution.
An example of the -s command, allowing an attacker to view the source code of index.php is below:
http://localhost/index.php?-s
Details: PHP-CGI-based setups vulnerability when parsing query string parameters from ph... (OID:
1.3.6.1.4.1.25623.1.0.103482)
References
Impact
Attackers can exploit this issue to execute arbitrary commands in the context of the application. Successful
attacks will compromise the affected application.
Solution
The repaired package can be downloaded from the referenced link. Please validate the package with its
signature.
Affected Software/OS
References
BID: 48539
Other: http://www.securityfocus.com/bid/48539
http://scarybeastsecurity.blogspot.com/2011/07/alert-vsftpd-download-backdoored.html
https://security.appspot.com/vsftpd.html
OpenVas Vulnerability Report HackerTarget.com
Impact
Attackers can exploit this issue to execute arbitrary commands in the context of the application. Successful
attacks will compromise the affected application.
Solution
The repaired package can be downloaded from the referenced link. Please validate the package with its
signature.
Affected Software/OS
References
BID: 48539
Other: http://www.securityfocus.com/bid/48539
http://scarybeastsecurity.blogspot.com/2011/07/alert-vsftpd-download-backdoored.html
https://security.appspot.com/vsftpd.html
OpenVas Vulnerability Report HackerTarget.com
Solution
Install latest version of unrealircd and check signatures of software you're installing.
Vulnerability Insight
Remote attackers can exploit this issue to execute arbitrary system commands within the context of the affected
application.
The issue affects Unreal 3.2.8.1 for Linux. Reportedly package Unreal3.2.8.1.tar.gz downloaded in November
2009 and later is affected. The MD5 sum of the affected file is 752e46f2d873c1679fa99de3f52a274d. Files with
MD5 sum of 7b741e94e867c0a7370553fd01506c66 are not affected.
References
CVE: CVE-2010-2075
BID: 40820
Other: http://www.unrealircd.com/txt/unrealsecadvisory.20100612.txt
http://seclists.org/fulldisclosure/2010/Jun/277
http://www.securityfocus.com/bid/40820
OpenVas Vulnerability Report HackerTarget.com
Misconfigured web servers allows remote clients to perform dangerous HTTP methods such as PUT and DELETE.
This script checks if they are enabled and can be misused to upload or delete files.
We could upload the following files via the PUT method at this web server:
http://192.168.1.109/dav/puttest2133722346.html
We could delete the following files via the DELETE method at this web server:
http://192.168.1.109/dav/puttest2133722346.html
Impact
- Enabled PUT method: This might allow an attacker to upload and run arbitrary code on this web server.
- Enabled DELETE method: This might allow an attacker to delete additional files on this web server.
Solution
Use access restrictions to these dangerous HTTP methods or disable them completely.
References
BID: 12141
Other: OWASP:OWASP-CM-001
OpenVas Vulnerability Report HackerTarget.com
It was possible to login into the remote SSH server using default credentials.
As the NVT 'SSH Brute Force Logins with default Credentials' (OID: 1.3.6.1.4.1.25623.1.0.108013) might run into
a timeout the actual reporting of this vulnerability takes place in this NVT instead. The script preference 'Report
timeout' allows you to configure if such an timeout is reported.
msfadmin:msfadmin
user:user
Solution
Try to login with a number of known default credentials via the SSH protocol.
Details: SSH Brute Force Logins With Default Credentials Reporting (OID: 1.3.6.1.4.1.25623.1.0.103239)
Summary
This host is installed with UnrealIRCd and is prone to authentication spoofing vulnerability.
Impact
Successful exploitation of this vulnerability will allows remote attackers to spoof certificate fingerprints and
consequently log in as another user.
Solution
Affected Software/OS
Vulnerability Insight
The flaw exists due to an error in the 'm_authenticate' function in 'modules/m_sasl.c' script.
Product: cpe:/a:unrealircd:unrealircd:3.2.8.1
Method: UnrealIRCd Detection (OID: 1.3.6.1.4.1.25623.1.0.809884)
References
CVE: CVE-2016-7144
BID: 92763
Other: http://seclists.org/oss-sec/2016/q3/420
http://www.openwall.com/lists/oss-security/2016/09/05/8
https://github.com/unrealircd/unrealircd/commit/f473e355e1dc422c4f019dbf86bc50ba1a34a766
https://bugs.unrealircd.org/main_page.php
OpenVas Vulnerability Report HackerTarget.com
The host is running TWiki and is prone to Cross-Site Request Forgery vulnerability.
Impact
Successful exploitation will allow attacker to gain administrative privileges on the target application and can
cause CSRF attack.
Solution
Affected Software/OS
Vulnerability Insight
Attack can be done by tricking an authenticated TWiki user into visiting a static HTML page on another side,
where a Javascript enabled browser will send an HTTP POST request to TWiki, which in turn will process the
request as the TWiki user.
Product: cpe:/a:twiki:twiki:01.Feb.2003
Method: TWiki Version Detection (OID: 1.3.6.1.4.1.25623.1.0.800399)
References
CVE: CVE-2009-4898
Other: http://www.openwall.com/lists/oss-security/2010/08/03/8
http://www.openwall.com/lists/oss-security/2010/08/02/17
http://twiki.org/cgi-bin/view/Codev/SecurityAuditTokenBasedCsrfFix
http://twiki.org/cgi-bin/view/Codev/DownloadTWiki
OpenVas Vulnerability Report HackerTarget.com
Impact
Successfully exploiting this issue may allow attackers to obtain sensitive information by conducting a man-in-
the-middle attack. This may lead to other attacks.
Solution
Updates are available. Please see the references for more information.
Affected Software/OS
OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m and 1.0.1 before 1.0.1h.
Vulnerability Insight
OpenSSL does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle
attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and
consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the 'CCS Injection'
vulnerability.
Details: SSL/TLS: OpenSSL CCS Man in the Middle Security Bypass Vulnerability (OID:
1.3.6.1.4.1.25623.1.0.105042)
References
CVE: CVE-2014-0224
BID: 67899
CERT: CB-K15/0567, CB-K15/0415, CB-K15/0384, CB-K15/0080, CB-K15/0079, CB-K15/0074, CB-K14/1617, CB-K14/1537,
CB-K14/1299, CB-K14/1297, CB-K14/1294, CB-K14/1202, CB-K14/1174, CB-K14/1153, CB-K14/0876, CB-K14/0756,
CB-K14/0746, CB-K14/0736, CB-K14/0722, CB-K14/0716, CB-K14/0708, CB-K14/0684, CB-K14/0683, CB-K14/0680,
DFN-CERT-2016-0388, DFN-CERT-2015-0593, DFN-CERT-2015-0427, DFN-CERT-2015-0396, DFN-CERT-2015-
0082, DFN-CERT-2015-0079, DFN-CERT-2015-0078, DFN-CERT-2014-1717, DFN-CERT-2014-1632, DFN-CERT-
2014-1364, DFN-CERT-2014-1357, DFN-CERT-2014-1350, DFN-CERT-2014-1265, DFN-CERT-2014-1209, DFN-
CERT-2014-0917, DFN-CERT-2014-0789, DFN-CERT-2014-0778, DFN-CERT-2014-0768, DFN-CERT-2014-0752,
DFN-CERT-2014-0747, DFN-CERT-2014-0738, DFN-CERT-2014-0715, DFN-CERT-2014-0714, DFN-CERT-2014-0709
Other: https://www.openssl.org/news/secadv/20140605.txt
http://www.securityfocus.com/bid/67899
http://openssl.org/
OpenVas Vulnerability Report HackerTarget.com
Multiple vendors' implementations of 'STARTTLS' are prone to a vulnerability that lets attackers inject arbitrary
commands.
Impact
An attacker can exploit this issue to execute arbitrary commands in the context of the user running the
application. Successful exploits can allow attackers to obtain email usernames and passwords.
Solution
Updates are available. Please see the references for more information.
Affected Software/OS
Ipswitch
Kerio
Postfix
Qmail-TLS
Oracle
SCO Group
spamdyke
ISC
Details: Multiple Vendors STARTTLS Implementation Plaintext Arbitrary Command Injection ... (OID:
1.3.6.1.4.1.25623.1.0.103935)
References
http://files.kolab.org/server/release/kolab-server-2.3.2/sources/release-notes.txt
http://www.postfix.org/CVE-2011-0411.html
http://www.pureftpd.org/project/pure-ftpd/news
http://www.watchguard.com/support/release-notes/xcs/9/en-
US/EN_ReleaseNotes_XCS_9_1_1/EN_ReleaseNotes_WG_XCS_9_1_TLS_Hotfix.pdf
http://www.spamdyke.org/documentation/Changelog.txt
http://datatracker.ietf.org/doc/draft-josefsson-kerberos5-starttls/?include_text=1
http://www.securityfocus.com/archive/1/516901
http://support.avaya.com/css/P8/documents/100134676
http://support.avaya.com/css/P8/documents/100141041
http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html
http://inoa.net/qmail-tls/vu555316.patch
http://www.kb.cert.org/vuls/id/555316
OpenVas Vulnerability Report HackerTarget.com
In Tiki the user task component is vulnerable to a SQL Injection via the tiki-user_tasks.php show_history
parameter.
Solution
Affected Software/OS
Details: Tiki Wiki CMS Groupware < 17.2 SQL Injection Vulnerability (OID: 1.3.6.1.4.1.25623.1.0.141885)
Product: cpe:/a:tiki:tikiwiki_cms/groupware:1.9.5
Method: Tiki Wiki CMS Groupware Version Detection (OID: 1.3.6.1.4.1.25623.1.0.901001)
References
CVE: CVE-2018-20719
Other: https://blog.ripstech.com/2018/scan-verify-patch-security-issues-in-minutes/
OpenVas Vulnerability Report HackerTarget.com
It was possible to login to the remote FTP service with the following anonymous account(s):
anonymous:[email protected]
ftp:[email protected]
Impact
Based on the files accessible via this anonymous FTP login and the permissions of this account an attacker might
be able to:
Solution
If you do not want to share files, you should disable anonymous logins.
Vulnerability Insight
A host that provides an FTP service may additionally provide Anonymous FTP access as well. Under this
arrangement, users do not strictly need an account on the host. Instead the user typically enters 'anonymous' or
'ftp' when prompted for username. Although users are commonly asked to send their email address as their
password, little to no verification is actually performed on the supplied data.
References
Other: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0497
OpenVas Vulnerability Report HackerTarget.com
The host is running TWiki and is prone to Cross-Site Request Forgery Vulnerability.
Impact
Successful exploitation will allow attacker to gain administrative privileges on the target application and can
cause CSRF attack.
Solution
Affected Software/OS
Vulnerability Insight
Remote authenticated user can create a specially crafted image tag that, when viewed by the target user, will
update pages on the target system with the privileges of the target user via HTTP requests.
Product: cpe:/a:twiki:twiki:01.Feb.2003
Method: TWiki Version Detection (OID: 1.3.6.1.4.1.25623.1.0.800399)
References
CVE: CVE-2009-1339
Other: http://secunia.com/advisories/34880
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526258
http://twiki.org/p/pub/Codev/SecurityAlert-CVE-2009-1339/TWiki-4.3.0-c-diff-cve-2009-1339.txt
OpenVas Vulnerability Report HackerTarget.com
Samba is prone to a vulnerability that allows attackers to execute arbitrary shell commands because the
software fails to sanitize user-supplied input.
Impact
An attacker may leverage this issue to execute arbitrary shell commands on an affected system with the
privileges of the application.
Solution
Affected Software/OS
Send a crafted command to the samba server and check for a remote command execution.
Details: Samba MS-RPC Remote Shell Command Execution Vulnerability (Active Check) (OID:
1.3.6.1.4.1.25623.1.0.108011)
Product: cpe:/a:samba:samba:3.0.20
Method: SMB NativeLanMan (OID: 1.3.6.1.4.1.25623.1.0.102011)
References
CVE: CVE-2007-2447
BID: 23972
Other: http://www.securityfocus.com/bid/23972
https://www.samba.org/samba/security/CVE-2007-2447.html
OpenVas Vulnerability Report HackerTarget.com
The remote web server supports the TRACE and/or TRACK methods. TRACE and TRACK are HTTP methods which
are used to debug web server connections.
The web server has the following HTTP methods enabled: TRACE
Impact
An attacker may use this flaw to trick your legitimate web users to give him their credentials.
Solution
Disable the TRACE and TRACK methods in your web server configuration.
Please see the manual of your web server or the references for more information.
Affected Software/OS
Vulnerability Insight
It has been shown that web servers supporting this methods are subject to cross-site-scripting attacks, dubbed
XST for Cross-Site-Tracing, when used in conjunction with various weaknesses in browsers.
References
Solution
It is suggested that, if you really want to publish this type of information, you use a mechanism that legitimate
users actually know about, such as Finger or HTTP.
Vulnerability Insight
VRFY and EXPN ask the server for information about an address. They are inherently unusable through firewalls,
gateways, mail exchangers for part-time hosts, etc.
Details: Check if Mailserver answer to VRFY and EXPN requests (OID: 1.3.6.1.4.1.25623.1.0.100072)
References
Other: http://cr.yp.to/smtp/vrfy.html
OpenVas Vulnerability Report HackerTarget.com
Certificate details:
subject ...:
1.2.840.113549.1.9.1=#726F6F74407562756E74753830342D626173652E6C6F63616C646F6D61696E,CN=ubu
ntu804-base.localdomain,OU=Office for Complication of Otherwise Simple
Affairs,O=OCOSA,L=Everywhere,ST=There is no such thing outside US,C=XX
subject alternative names (SAN):
None
issued by .:
1.2.840.113549.1.9.1=#726F6F74407562756E74753830342D626173652E6C6F63616C646F6D61696E,CN=ubu
ntu804-base.localdomain,OU=Office for Complication of Otherwise Simple
Affairs,O=OCOSA,L=Everywhere,ST=There is no such thing outside US,C=XX
serial ....: 00FAF93A4C7FB6B9CC
valid from : 2010-03-17 14:07:45 UTC
valid until: 2010-04-16 14:07:45 UTC
fingerprint (SHA-1): ED093088706603BFD5DC237399B498DA2D4D31C6
fingerprint (SHA-256): E7A7FA0D63E457C7C4A59B38B70849C6A70BDA6F830C7AF1E32DEE436DE813CC
Solution
Vulnerability Insight
This script checks expiry dates of certificates associated with SSL/TLS-enabled services on the target and reports
whether any have already expired.
Certificate details:
subject ...:
1.2.840.113549.1.9.1=#726F6F74407562756E74753830342D626173652E6C6F63616C646F6D61696E,CN=ubu
ntu804-base.localdomain,OU=Office for Complication of Otherwise Simple
Affairs,O=OCOSA,L=Everywhere,ST=There is no such thing outside US,C=XX
subject alternative names (SAN):
None
issued by .:
1.2.840.113549.1.9.1=#726F6F74407562756E74753830342D626173652E6C6F63616C646F6D61696E,CN=ubu
ntu804-base.localdomain,OU=Office for Complication of Otherwise Simple
Affairs,O=OCOSA,L=Everywhere,ST=There is no such thing outside US,C=XX
serial ....: 00FAF93A4C7FB6B9CC
valid from : 2010-03-17 14:07:45 UTC
valid until: 2010-04-16 14:07:45 UTC
fingerprint (SHA-1): ED093088706603BFD5DC237399B498DA2D4D31C6
fingerprint (SHA-256): E7A7FA0D63E457C7C4A59B38B70849C6A70BDA6F830C7AF1E32DEE436DE813CC
Solution
Vulnerability Insight
This script checks expiry dates of certificates associated with SSL/TLS-enabled services on the target and reports
whether any have already expired.
Solution
Affected Software/OS
Product: cpe:/a:twiki:twiki:01.Feb.2003
Method: TWiki Version Detection (OID: 1.3.6.1.4.1.25623.1.0.800399)
References
CVE: CVE-2018-20212
Other: https://seclists.org/fulldisclosure/2019/Jan/7
http://twiki.org/cgi-bin/view/Codev/DownloadTWiki
OpenVas Vulnerability Report HackerTarget.com
The /doc directory is browsable. /doc shows the content of the /usr/doc directory and therefore it shows which
programs and - important! - the version of the installed programs.
Solution
Use access restrictions for the /doc directory. If you use Apache you might use this in your access.conf:
<Directory /usr/doc> AllowOverride None order deny,allow deny from all allow from localhost </Directory>
References
CVE: CVE-1999-0678
BID: 318
OpenVas Vulnerability Report HackerTarget.com
The host is installed with Tiki Wiki CMS Groupware and is prone to input sanitation weakness vulnerability.
Impact
Successful exploitation could allow arbitrary code execution in the context of an affected site.
Solution
Affected Software/OS
Tiki Wiki CMS Groupware version prior to 2.2 on all running platform
Vulnerability Insight
The vulnerability is due to input validation error in tiki-error.php which fails to sanitise before being returned to
the user.
Details: Tiki Wiki CMS Groupware Input Sanitation Weakness Vulnerability (OID: 1.3.6.1.4.1.25623.1.0.800315)
Product: cpe:/a:tiki:tikiwiki_cms/groupware:1.9.5
Method: Tiki Wiki CMS Groupware Version Detection (OID: 1.3.6.1.4.1.25623.1.0.901001)
References
Summary
The host is installed with Tiki Wiki CMS Groupware and is prone to a local file inclusion vulnerability.
Impact
Successful exploitation will allow an user having access to the admin backend to gain access to arbitrary files
and to compromise the application.
Solution
Upgrade to Tiki Wiki CMS Groupware version 12.11 LTS, 15.4 or later.
Affected Software/OS
Vulnerability Insight
The Flaw is due to improper sanitization of input passed to the 'fixedURLData' parameter of the
'display_banner.php' script.
Details: Tiki Wiki CMS Groupware 'fixedURLData' Local File Inclusion Vulnerability (OID:
1.3.6.1.4.1.25623.1.0.108064)
Product: cpe:/a:tiki:tikiwiki_cms/groupware:1.9.5
Method: Tiki Wiki CMS Groupware Version Detection (OID: 1.3.6.1.4.1.25623.1.0.901001)
References
CVE: CVE-2016-10143
Other: http://tiki.org/article445-Security-updates-Tiki-16-2-15-4-and-Tiki-12-11-released
https://sourceforge.net/p/tikiwiki/code/60308/
https://tiki.org
OpenVas Vulnerability Report HackerTarget.com
awiki is prone to multiple local file-include vulnerabilities because it fails to properly sanitize user-supplied input.
Impact
An attacker can exploit this vulnerability to obtain potentially sensitive information and execute arbitrary local
scripts in the context of the webserver process. This may allow the attacker to compromise the application and
the host. Other attacks are also possible.
Solution
No known solution was made available for at least one year since the disclosure of this vulnerability. Likely none
will be provided anymore. General solution options are to upgrade to a newer release, disable respective
features, remove the product or replace the product by another one.
Affected Software/OS
References
BID: 49187
Other: https://www.exploit-db.com/exploits/36047/
http://www.securityfocus.com/bid/49187
http://www.kobaonline.com/awiki/
OpenVas Vulnerability Report HackerTarget.com
The remote host is running a VNC server providing one or more insecure or cryptographically weak Security
Type(s) not intended for use on untrusted networks.
The VNC server provides the following insecure or cryptographically weak Security Type(s):
2 (VNC authentication)
Impact
An attacker can uncover sensitive data by sniffing traffic to the VNC server.
Solution
Run the session over an encrypted channel provided by IPsec [RFC4301] or SSH [RFC4254]. Some VNC server
vendors are also providing more secure Security Types within their products.
References
Other: https://tools.ietf.org/html/rfc6143#page-10
OpenVas Vulnerability Report HackerTarget.com
The remote host is running a Telnet service that allows cleartext logins over unencrypted connections.
Impact
An attacker can uncover login names and passwords by sniffing traffic to the Telnet service.
Solution
Replace Telnet with a protocol like SSH which supports encrypted connections.
The remote host is running a FTP service that allows cleartext logins over unencrypted connections.
The remote FTP service accepts logins without a previous sent 'AUTH TLS' command. Response(s):
Impact
An attacker can uncover login names and passwords by sniffing traffic to the FTP service.
Solution
Enable FTPS or enforce the connection via the 'AUTH TLS' command. Please see the manual of the FTP service for
more information.
Tries to login to a non FTPS enabled FTP service without sending a 'AUTH TLS' command first and checks if the
service is accepting the login without enforcing the use of the 'AUTH TLS' command.
The remote host is running a FTP service that allows cleartext logins over unencrypted connections.
The remote FTP service accepts logins without a previous sent 'AUTH TLS' command. Response(s):
Impact
An attacker can uncover login names and passwords by sniffing traffic to the FTP service.
Solution
Enable FTPS or enforce the connection via the 'AUTH TLS' command. Please see the manual of the FTP service for
more information.
Tries to login to a non FTPS enabled FTP service without sending a 'AUTH TLS' command first and checks if the
service is accepting the login without enforcing the use of the 'AUTH TLS' command.
The host / application transmits sensitive information (username, passwords) in cleartext via HTTP.
http://192.168.1.109/phpMyAdmin/:pma_password
http://192.168.1.109/phpMyAdmin/?D=A:pma_password
http://192.168.1.109/tikiwiki/tiki-install.php:pass
http://192.168.1.109/twiki/bin/view/TWiki/TWikiUserAuthentication:oldpassword
Impact
An attacker could use this situation to compromise or eavesdrop on the HTTP communication between the client
and the server using a man-in-the-middle attack to get access to sensitive data like usernames or passwords.
Solution
Enforce the transmission of sensitive data via an encrypted SSL/TLS connection. Additionally make sure the host
/ application is redirecting all users to the secured SSL/TLS connection before allowing to input sensitive data
into the mentioned functions.
Affected Software/OS
Hosts / applications which doesn't enforce the transmission of sensitive data via an encrypted SSL/TLS
connection.
Evaluate previous collected information and check if the host / application is not enforcing the transmission of
sensitive data via an encrypted SSL/TLS connection.
References
Other: https://www.owasp.org/index.php/Top_10_2013-A2-Broken_Authentication_and_Session_Management
https://www.owasp.org/index.php/Top_10_2013-A6-Sensitive_Data_Exposure
https://cwe.mitre.org/data/definitions/319.html
OpenVas Vulnerability Report HackerTarget.com
Impact
Successful exploitation will allow a man-in-the-middle attackers gain access to the plain text data stream.
Solution
- Disable SSLv3
Vulnerability Insight
The flaw is due to the block cipher padding not being deterministic and not covered by the Message
Authentication Code
Details: SSL/TLS: SSLv3 Protocol CBC Cipher Suites Information Disclosure Vulnerability ... (OID:
1.3.6.1.4.1.25623.1.0.802087)
References
CVE: CVE-2014-3566
BID: 70574
CERT: CB-K17/1198, CB-K17/1196, CB-K16/1828, CB-K16/1438, CB-K16/1384, CB-K16/1102, CB-K16/0599, CB-K16/0156,
CB-K15/1514, CB-K15/1358, CB-K15/1021, CB-K15/0972, CB-K15/0637, CB-K15/0590, CB-K15/0525, CB-K15/0393,
CB-K15/0384, CB-K15/0287, CB-K15/0252, CB-K15/0246, CB-K15/0237, CB-K15/0118, CB-K15/0110, CB-K15/0108,
CB-K15/0080, CB-K15/0078, CB-K15/0077, CB-K15/0075, CB-K14/1617, CB-K14/1581, CB-K14/1537, CB-K14/1479,
CB-K14/1458, CB-K14/1342, CB-K14/1314, CB-K14/1313, CB-K14/1311, CB-K14/1304, CB-K14/1296, DFN-CERT-
2017-1238, DFN-CERT-2017-1236, DFN-CERT-2016-1929, DFN-CERT-2016-1527, DFN-CERT-2016-1468, DFN-
CERT-2016-1168, DFN-CERT-2016-0884, DFN-CERT-2016-0642, DFN-CERT-2016-0388, DFN-CERT-2016-0171,
DFN-CERT-2015-1431, DFN-CERT-2015-1075, DFN-CERT-2015-1026, DFN-CERT-2015-0664, DFN-CERT-2015-
0548, DFN-CERT-2015-0404, DFN-CERT-2015-0396, DFN-CERT-2015-0259, DFN-CERT-2015-0254, DFN-CERT-
2015-0245, DFN-CERT-2015-0118, DFN-CERT-2015-0114, DFN-CERT-2015-0083, DFN-CERT-2015-0082, DFN-
CERT-2015-0081, DFN-CERT-2015-0076, DFN-CERT-2014-1717, DFN-CERT-2014-1680, DFN-CERT-2014-1632,
DFN-CERT-2014-1564, DFN-CERT-2014-1542, DFN-CERT-2014-1414, DFN-CERT-2014-1366, DFN-CERT-2014-1354
Other: https://www.openssl.org/~bodo/ssl-poodle.pdf
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.dfranke.us/posts/2014-10-14-how-poodle-happened.html
http://googleonlinesecurity.blogspot.in/2014/10/this-poodle-bites-exploiting-ssl-30.html
OpenVas Vulnerability Report HackerTarget.com
Impact
Successful exploitation will allow a man-in-the-middle attackers gain access to the plain text data stream.
Solution
- Disable SSLv3
Vulnerability Insight
The flaw is due to the block cipher padding not being deterministic and not covered by the Message
Authentication Code
Details: SSL/TLS: SSLv3 Protocol CBC Cipher Suites Information Disclosure Vulnerability ... (OID:
1.3.6.1.4.1.25623.1.0.802087)
References
CVE: CVE-2014-3566
BID: 70574
CERT: CB-K17/1198, CB-K17/1196, CB-K16/1828, CB-K16/1438, CB-K16/1384, CB-K16/1102, CB-K16/0599, CB-K16/0156,
CB-K15/1514, CB-K15/1358, CB-K15/1021, CB-K15/0972, CB-K15/0637, CB-K15/0590, CB-K15/0525, CB-K15/0393,
CB-K15/0384, CB-K15/0287, CB-K15/0252, CB-K15/0246, CB-K15/0237, CB-K15/0118, CB-K15/0110, CB-K15/0108,
CB-K15/0080, CB-K15/0078, CB-K15/0077, CB-K15/0075, CB-K14/1617, CB-K14/1581, CB-K14/1537, CB-K14/1479,
CB-K14/1458, CB-K14/1342, CB-K14/1314, CB-K14/1313, CB-K14/1311, CB-K14/1304, CB-K14/1296, DFN-CERT-
2017-1238, DFN-CERT-2017-1236, DFN-CERT-2016-1929, DFN-CERT-2016-1527, DFN-CERT-2016-1468, DFN-
CERT-2016-1168, DFN-CERT-2016-0884, DFN-CERT-2016-0642, DFN-CERT-2016-0388, DFN-CERT-2016-0171,
DFN-CERT-2015-1431, DFN-CERT-2015-1075, DFN-CERT-2015-1026, DFN-CERT-2015-0664, DFN-CERT-2015-
0548, DFN-CERT-2015-0404, DFN-CERT-2015-0396, DFN-CERT-2015-0259, DFN-CERT-2015-0254, DFN-CERT-
2015-0245, DFN-CERT-2015-0118, DFN-CERT-2015-0114, DFN-CERT-2015-0083, DFN-CERT-2015-0082, DFN-
CERT-2015-0081, DFN-CERT-2015-0076, DFN-CERT-2014-1717, DFN-CERT-2014-1680, DFN-CERT-2014-1632,
DFN-CERT-2014-1564, DFN-CERT-2014-1542, DFN-CERT-2014-1414, DFN-CERT-2014-1366, DFN-CERT-2014-1354
Other: https://www.openssl.org/~bodo/ssl-poodle.pdf
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.dfranke.us/posts/2014-10-14-how-poodle-happened.html
http://googleonlinesecurity.blogspot.in/2014/10/this-poodle-bites-exploiting-ssl-30.html
OpenVas Vulnerability Report HackerTarget.com
It was possible to detect the usage of the deprecated SSLv2 and/or SSLv3 protocol on this system.
In addition to TLSv1.0+ the service is also providing the deprecated SSLv3 protocol and supports one or more
ciphers. Those supported ciphers can be found in the 'SSL/TLS: Report Weak and Supported Ciphers' (OID:
1.3.6.1.4.1.25623.1.0.802067) NVT.
Impact
An attacker might be able to use the known cryptographic flaws to eavesdrop the connection between clients
and the service to get access to sensitive data transferred within the secured connection.
Solution
It is recommended to disable the deprecated SSLv2 and/or SSLv3 protocols in favor of the TLSv1+ protocols.
Please see the references for more information.
Affected Software/OS
All services providing an encrypted communication using the SSLv2 and/or SSLv3 protocols.
Vulnerability Insight
The SSLv2 and SSLv3 protocols containing known cryptographic flaws like:
Details: SSL/TLS: Deprecated SSLv2 and SSLv3 Protocol Detection (OID: 1.3.6.1.4.1.25623.1.0.111012)
References
https://bettercrypto.org/
https://mozilla.github.io/server-side-tls/ssl-config-generator/
https://drownattack.com/
https://www.imperialviolet.org/2014/10/14/poodle.html
OpenVas Vulnerability Report HackerTarget.com
It was possible to detect the usage of the deprecated SSLv2 and/or SSLv3 protocol on this system.
In addition to TLSv1.0+ the service is also providing the deprecated SSLv2 and SSLv3 protocols and supports one
or more ciphers. Those supported ciphers can be found in the 'SSL/TLS: Report Weak and Supported Ciphers'
(OID: 1.3.6.1.4.1.25623.1.0.802067) NVT.
Impact
An attacker might be able to use the known cryptographic flaws to eavesdrop the connection between clients
and the service to get access to sensitive data transferred within the secured connection.
Solution
It is recommended to disable the deprecated SSLv2 and/or SSLv3 protocols in favor of the TLSv1+ protocols.
Please see the references for more information.
Affected Software/OS
All services providing an encrypted communication using the SSLv2 and/or SSLv3 protocols.
Vulnerability Insight
The SSLv2 and SSLv3 protocols containing known cryptographic flaws like:
Details: SSL/TLS: Deprecated SSLv2 and SSLv3 Protocol Detection (OID: 1.3.6.1.4.1.25623.1.0.111012)
References
https://bettercrypto.org/
https://mozilla.github.io/server-side-tls/ssl-config-generator/
https://drownattack.com/
https://www.imperialviolet.org/2014/10/14/poodle.html
OpenVas Vulnerability Report HackerTarget.com
This host is accepting 'DHE_EXPORT' cipher suites and is prone to man in the middle attack.
'DHE_EXPORT' cipher suites accepted by this service via the SSLv3 protocol:
TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA
TLS_DH_anon_EXPORT_WITH_RC4_40_MD5
'DHE_EXPORT' cipher suites accepted by this service via the TLSv1.0 protocol:
TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA
TLS_DH_anon_EXPORT_WITH_RC4_40_MD5
Impact
Successful exploitation will allow a man-in-the-middle attacker to downgrade the security of a TLS session to
512-bit export-grade cryptography, which is significantly weaker, allowing the attacker to more easily break the
encryption and monitor or tamper with the encrypted stream.
Solution
Affected Software/OS
Vulnerability Insight
Flaw is triggered when handling Diffie-Hellman key exchanges defined in the 'DHE_EXPORT' cipher suites.
Details: SSL/TLS: 'DHE_EXPORT' Man in the Middle Security Bypass Vulnerability (LogJam) (OID:
1.3.6.1.4.1.25623.1.0.805188)
References
CVE: CVE-2015-4000
BID: 74733
OpenVas Vulnerability Report HackerTarget.com
This host is accepting 'RSA_EXPORT' cipher suites and is prone to man in the middle attack.
'RSA_EXPORT' cipher suites accepted by this service via the SSLv3 protocol:
TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
TLS_RSA_EXPORT_WITH_DES40_CBC_SHA
TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5
TLS_RSA_EXPORT_WITH_RC4_40_MD5
'RSA_EXPORT' cipher suites accepted by this service via the TLSv1.0 protocol:
TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
TLS_RSA_EXPORT_WITH_DES40_CBC_SHA
TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5
TLS_RSA_EXPORT_WITH_RC4_40_MD5
Impact
Successful exploitation will allow remote attacker to downgrade the security of a session to use 'RSA_EXPORT'
cipher suites, which are significantly weaker than non-export cipher suites. This may allow a man-in-the-middle
attacker to more easily break the encryption and monitor or tamper with the encrypted stream.
Solution
Affected Software/OS
- OpenSSL version before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k.
Vulnerability Insight
Flaw is due to improper handling RSA temporary keys in a non-export RSA key exchange cipher suite.
Details: SSL/TLS: RSA Temporary Key Handling 'RSA_EXPORT' Downgrade Issue (FREAK) (OID:
1.3.6.1.4.1.25623.1.0.805142)
References
CVE: CVE-2015-0204
BID: 71936
CERT: CB-K18/0799, CB-K16/1289, CB-K16/1096, CB-K15/1751, CB-K15/1266, CB-K15/0850, CB-K15/0764, CB-K15/0720,
CB-K15/0548, CB-K15/0526, CB-K15/0509, CB-K15/0493, CB-K15/0384, CB-K15/0365, CB-K15/0364, CB-K15/0302,
CB-K15/0192, CB-K15/0016, DFN-CERT-2018-1408, DFN-CERT-2016-1372, DFN-CERT-2016-1164, DFN-CERT-2016-
0388, DFN-CERT-2015-1853, DFN-CERT-2015-1332, DFN-CERT-2015-0884, DFN-CERT-2015-0800, DFN-CERT-
2015-0758, DFN-CERT-2015-0567, DFN-CERT-2015-0544, DFN-CERT-2015-0530, DFN-CERT-2015-0396, DFN-
CERT-2015-0375, DFN-CERT-2015-0374, DFN-CERT-2015-0305, DFN-CERT-2015-0199, DFN-CERT-2015-0021
OpenVas Vulnerability Report HackerTarget.com
Other: https://freakattack.com
http://secpod.org/blog/?p=3818
http://blog.cryptographyengineering.com/2015/03/attack-of-week-freak-or-factoring-nsa.html
https://www.openssl.org
OpenVas Vulnerability Report HackerTarget.com
This routine reports all Weak SSL/TLS cipher suites accepted by a service.
NOTE: No severity for SMTP services with 'Opportunistic TLS' and weak cipher suites on port 25/tcp is reported. If
too strong cipher suites are configured for this service the alternative would be to fall back to an even more
insecure cleartext communication.
'Weak' cipher suites accepted by this service via the SSLv3 protocol:
TLS_RSA_WITH_RC4_128_SHA
'Weak' cipher suites accepted by this service via the TLSv1.0 protocol:
TLS_RSA_WITH_RC4_128_SHA
Solution
The configuration of this services should be changed so that it does not accept the listed weak cipher suites
anymore.
Please see the references for more resources supporting you with this task.
Vulnerability Insight
These rules are applied for the evaluation of the cryptographic strength:
- Ciphers using 64 bit or less are considered to be vulnerable to brute force methods and therefore considered as
weak (CVE-2015-4000).
- Any cipher considered to be secure for only the next 10 years is considered as medium
References
Other: https://www.bsi.bund.de/SharedDocs/Warnmeldungen/DE/CB/warnmeldung_cb-k16-1465_update_6.html
https://bettercrypto.org/
https://mozilla.github.io/server-side-tls/ssl-config-generator/
OpenVas Vulnerability Report HackerTarget.com
The following weak client-to-server encryption algorithms are supported by the remote service:
3des-cbc
aes128-cbc
aes192-cbc
aes256-cbc
arcfour
arcfour128
arcfour256
blowfish-cbc
cast128-cbc
[email protected]
The following weak server-to-client encryption algorithms are supported by the remote service:
3des-cbc
aes128-cbc
aes192-cbc
aes256-cbc
arcfour
arcfour128
arcfour256
blowfish-cbc
cast128-cbc
[email protected]
Solution
Vulnerability Insight
The `arcfour` cipher is the Arcfour stream cipher with 128-bit keys. The Arcfour cipher is believed to be
compatible with the RC4 cipher [SCHNEIER]. Arcfour (and RC4) has problems with weak keys, and should not be
used anymore.
The `none` algorithm specifies that no encryption is to be done. Note that this method provides no
confidentiality protection, and it is NOT RECOMMENDED to use it.
A vulnerability exists in SSH messages that employ CBC mode that may allow an attacker to recover plaintext
from a block of ciphertext.
References
Other: https://tools.ietf.org/html/rfc4253#section-6.3
https://www.kb.cert.org/vuls/id/958563
OpenVas Vulnerability Report HackerTarget.com
OpenVas Vulnerability Report HackerTarget.com
Impact
Successful exploitation will allow attackers to inject arbitrary HTML code within the error page and conduct
phishing attacks.
Solution
No known solution was made available for at least one year since the disclosure of this vulnerability. Likely none
will be provided anymore. General solution options are to upgrade to a newer release, disable respective
features, remove the product or replace the product by another one.
Affected Software/OS
Vulnerability Insight
The flaw is caused by input validation errors in the 'error.php' script when processing crafted BBcode tags
containing '@' characters, which could allow attackers to inject arbitrary HTML code within the error page and
conduct phishing attacks.
Product: cpe:/a:phpmyadmin:phpmyadmin:3.1.1
Method: phpMyAdmin Detection (OID: 1.3.6.1.4.1.25623.1.0.900129)
References
CVE: CVE-2010-4480
CERT: DFN-CERT-2011-0467, DFN-CERT-2011-0451, DFN-CERT-2011-0016, DFN-CERT-2011-0002
Other: http://www.exploit-db.com/exploits/15699/
http://www.vupen.com/english/advisories/2010/3133
OpenVas Vulnerability Report HackerTarget.com
This host is running Apache HTTP Server and is prone to cookie information disclosure vulnerability.
Impact
Successful exploitation will allow attackers to obtain sensitive information that may aid in further attacks.
Solution
Affected Software/OS
Vulnerability Insight
The flaw is due to an error within the default error response for status code 400 when no custom ErrorDocument
is configured, which can be exploited to expose 'httpOnly' cookies.
Details: Apache HTTP Server 'httpOnly' Cookie Information Disclosure Vulnerability (OID:
1.3.6.1.4.1.25623.1.0.902830)
References
CVE: CVE-2012-0053
BID: 51706
CERT: CB-K15/0080, CB-K14/1505, CB-K14/0608, DFN-CERT-2015-0082, DFN-CERT-2014-1592, DFN-CERT-2014-0635,
DFN-CERT-2013-1307, DFN-CERT-2012-1276, DFN-CERT-2012-1112, DFN-CERT-2012-0928, DFN-CERT-2012-
0758, DFN-CERT-2012-0744, DFN-CERT-2012-0568, DFN-CERT-2012-0425, DFN-CERT-2012-0424, DFN-CERT-
2012-0387, DFN-CERT-2012-0343, DFN-CERT-2012-0332, DFN-CERT-2012-0306, DFN-CERT-2012-0264, DFN-
CERT-2012-0203, DFN-CERT-2012-0188
Other: http://secunia.com/advisories/47779
http://www.exploit-db.com/exploits/18442
http://rhn.redhat.com/errata/RHSA-2012-0128.html
http://httpd.apache.org/security/vulnerabilities_22.html
http://svn.apache.org/viewvc?view=revision&revision=1235454
http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00026.html
OpenVas Vulnerability Report HackerTarget.com
The remote service is using a SSL/TLS certificate in the certificate chain that has been signed using a
cryptographically weak hashing algorithm.
The following certificates are part of the certificate chain but using insecure signature algorithms:
Subject:
1.2.840.113549.1.9.1=#726F6F74407562756E74753830342D626173652E6C6F63616C646F6D61696E,CN=ubu
ntu804-base.localdomain,OU=Office for Complication of Otherwise Simple
Affairs,O=OCOSA,L=Everywhere,ST=There is no such thing outside US,C=XX
Signature Algorithm: sha1WithRSAEncryption
Solution
Servers that use SSL/TLS certificates signed with a weak SHA-1, MD5, MD4 or MD2 hashing algorithm will need to
obtain new SHA-2 signed SSL/TLS certificates to avoid web browser SSL/TLS certificate warnings.
Vulnerability Insight
The following hashing algorithms used for signing SSL/TLS certificates are considered cryptographically weak and
not secure enough for ongoing use:
Beginning as late as January 2017 and as early as June 2016, browser developers such as Microsoft and Google
will begin warning users when visiting web sites that use SHA-1 signed Secure Socket Layer (SSL) certificates.
NOTE: The script preference allows to set one or more custom SHA-1 fingerprints of CA certificates which are
trusted by this routine. The fingerprints needs to be passed comma-separated and case-insensitive:
Fingerprint1
or
fingerprint1,Fingerprint2
Check which hashing algorithm was used to sign the remote SSL/TLS certificate.
Details: SSL/TLS: Certificate Signed Using A Weak Signature Algorithm (OID: 1.3.6.1.4.1.25623.1.0.105880)
References
Other: https://blog.mozilla.org/security/2014/09/23/phasing-out-certificates-with-sha-1-based-signature-algorithms/
OpenVas Vulnerability Report HackerTarget.com
The remote service is using a SSL/TLS certificate in the certificate chain that has been signed using a
cryptographically weak hashing algorithm.
The following certificates are part of the certificate chain but using insecure signature algorithms:
Subject:
1.2.840.113549.1.9.1=#726F6F74407562756E74753830342D626173652E6C6F63616C646F6D61696E,CN=ubu
ntu804-base.localdomain,OU=Office for Complication of Otherwise Simple
Affairs,O=OCOSA,L=Everywhere,ST=There is no such thing outside US,C=XX
Signature Algorithm: sha1WithRSAEncryption
Solution
Servers that use SSL/TLS certificates signed with a weak SHA-1, MD5, MD4 or MD2 hashing algorithm will need to
obtain new SHA-2 signed SSL/TLS certificates to avoid web browser SSL/TLS certificate warnings.
Vulnerability Insight
The following hashing algorithms used for signing SSL/TLS certificates are considered cryptographically weak and
not secure enough for ongoing use:
Beginning as late as January 2017 and as early as June 2016, browser developers such as Microsoft and Google
will begin warning users when visiting web sites that use SHA-1 signed Secure Socket Layer (SSL) certificates.
NOTE: The script preference allows to set one or more custom SHA-1 fingerprints of CA certificates which are
trusted by this routine. The fingerprints needs to be passed comma-separated and case-insensitive:
Fingerprint1
or
fingerprint1,Fingerprint2
Check which hashing algorithm was used to sign the remote SSL/TLS certificate.
Details: SSL/TLS: Certificate Signed Using A Weak Signature Algorithm (OID: 1.3.6.1.4.1.25623.1.0.105880)
References
Other: https://blog.mozilla.org/security/2014/09/23/phasing-out-certificates-with-sha-1-based-signature-algorithms/
OpenVas Vulnerability Report HackerTarget.com
The SSL/TLS service uses Diffie-Hellman groups with insufficient strength (key size < 2048).
Impact
Solution
Deploy (Ephemeral) Elliptic-Curve Diffie-Hellman (ECDHE) or use a 2048-bit or stronger Diffie-Hellman group (see
the references).
For Apache Web Servers: Beginning with version 2.4.7, mod_ssl will use DH parameters which include primes
with lengths of more than 1024 bits.
Vulnerability Insight
The Diffie-Hellman group are some big numbers that are used as base for the DH computations. They can be,
and often are, fixed. The security of the final secret depends on the size of these parameters. It was found that
512 and 768 bits to be weak, 1024 bits to be breakable by really powerful attackers like governments.
Details: SSL/TLS: Diffie-Hellman Key Exchange Insufficient DH Group Strength Vulnerabili... (OID:
1.3.6.1.4.1.25623.1.0.106223)
References
Other: https://weakdh.org/
https://weakdh.org/sysadmin.html
OpenVas Vulnerability Report HackerTarget.com
The SSL/TLS service uses Diffie-Hellman groups with insufficient strength (key size < 2048).
Impact
Solution
Deploy (Ephemeral) Elliptic-Curve Diffie-Hellman (ECDHE) or use a 2048-bit or stronger Diffie-Hellman group (see
the references).
For Apache Web Servers: Beginning with version 2.4.7, mod_ssl will use DH parameters which include primes
with lengths of more than 1024 bits.
Vulnerability Insight
The Diffie-Hellman group are some big numbers that are used as base for the DH computations. They can be,
and often are, fixed. The security of the final secret depends on the size of these parameters. It was found that
512 and 768 bits to be weak, 1024 bits to be breakable by really powerful attackers like governments.
Details: SSL/TLS: Diffie-Hellman Key Exchange Insufficient DH Group Strength Vulnerabili... (OID:
1.3.6.1.4.1.25623.1.0.106223)
References
Other: https://weakdh.org/
https://weakdh.org/sysadmin.html
An XSS vulnerability (via an SVG image) in Tiki allows an authenticated user to gain administrator privileges if an
administrator opens a wiki page with a malicious SVG image, related to lib/filegals/filegallib.php.
Solution
Affected Software/OS
Product: cpe:/a:tiki:tikiwiki_cms/groupware:1.9.5
Method: Tiki Wiki CMS Groupware Version Detection (OID: 1.3.6.1.4.1.25623.1.0.901001)
References
CVE: CVE-2018-7188
Other: http://openwall.com/lists/oss-security/2018/02/16/1
The remote host implements TCP timestamps and therefore allows to compute the uptime.
Impact
A side effect of this feature is that the uptime of the remote host can sometimes be computed.
Solution
To disable TCP timestamps on linux add the line 'net.ipv4.tcp_timestamps = 0' to /etc/sysctl.conf. Execute 'sysctl
-p' to apply the settings at runtime.
To disable TCP timestamps on Windows execute 'netsh int tcp set global timestamps=disabled'
Starting with Windows Server 2008 and Vista, the timestamp can not be completely disabled.
The default behavior of the TCP/IP stack on this Systems is to not use the Timestamp options when initiating TCP
connections, but use them if the TCP peer that is initiating communication includes them in their synchronize
(SYN) segment.
Affected Software/OS
Vulnerability Insight
Special IP packets are forged and sent with a little delay in between to the target IP. The responses are searched
for a timestamps. If found, the timestamps are reported.
References
Other: http://www.ietf.org/rfc/rfc1323.txt
The remote SSH server is configured to allow weak MD5 and/or 96-bit MAC algorithms.
The following weak client-to-server MAC algorithms are supported by the remote service:
hmac-md5
hmac-md5-96
hmac-sha1-96
The following weak server-to-client MAC algorithms are supported by the remote service:
hmac-md5
hmac-md5-96
hmac-sha1-96
Solution