dradis-openvas 3.6.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +7 -0
- data/.gitignore +8 -0
- data/.rspec +2 -0
- data/CHANGELOG.md +3 -0
- data/CONTRIBUTING.md +3 -0
- data/Gemfile +23 -0
- data/Guardfile +8 -0
- data/LICENSE +339 -0
- data/README.md +29 -0
- data/Rakefile +2 -0
- data/dradis-openvas.gemspec +32 -0
- data/lib/dradis-openvas.rb +8 -0
- data/lib/dradis/plugins/openvas.rb +11 -0
- data/lib/dradis/plugins/openvas/engine.rb +9 -0
- data/lib/dradis/plugins/openvas/field_processor.rb +42 -0
- data/lib/dradis/plugins/openvas/gem_version.rb +19 -0
- data/lib/dradis/plugins/openvas/importer.rb +101 -0
- data/lib/dradis/plugins/openvas/version.rb +13 -0
- data/lib/openvas/result.rb +163 -0
- data/lib/openvas/v6/result.rb +12 -0
- data/lib/openvas/v7/result.rb +61 -0
- data/lib/tasks/thorfile.rb +26 -0
- data/spec/fixtures/files/result.xml +48 -0
- data/spec/fixtures/files/result2.xml +68 -0
- data/spec/fixtures/files/v7/report_v7.xml +427 -0
- data/spec/openvas/result_spec.rb +35 -0
- data/spec/spec_helper.rb +35 -0
- data/spec/support/fixture_loader.rb +5 -0
- data/templates/result.fields +18 -0
- data/templates/result.sample +48 -0
- data/templates/result.template +31 -0
- metadata +123 -0
@@ -0,0 +1,26 @@
|
|
1
|
+
class OpenVASTasks < Thor
|
2
|
+
include Rails.application.config.dradis.thor_helper_module
|
3
|
+
|
4
|
+
namespace "dradis:plugins:openvas"
|
5
|
+
|
6
|
+
desc "upload FILE", "upload OpenVAS XML results"
|
7
|
+
def upload(file_path)
|
8
|
+
require 'config/environment'
|
9
|
+
|
10
|
+
logger = Logger.new(STDOUT)
|
11
|
+
logger.level = Logger::DEBUG
|
12
|
+
|
13
|
+
unless File.exists?(file_path)
|
14
|
+
$stderr.puts "** the file [#{file_path}] does not exist"
|
15
|
+
exit -1
|
16
|
+
end
|
17
|
+
|
18
|
+
detect_and_set_project_scope
|
19
|
+
|
20
|
+
importer = Dradis::Plugins::OpenVAS::Importer.new(logger: logger)
|
21
|
+
importer.import(file: file_path)
|
22
|
+
|
23
|
+
logger.close
|
24
|
+
end
|
25
|
+
|
26
|
+
end
|
@@ -0,0 +1,48 @@
|
|
1
|
+
<?xml version="1.0"?>
|
2
|
+
<result id="e2ccf551-ea4e-4186-9b24-76287d6244f3">
|
3
|
+
<subnet>172.31.253.9</subnet>
|
4
|
+
<host>172.31.253.9</host>
|
5
|
+
<port>general/tcp</port>
|
6
|
+
<nvt oid="1.3.6.1.4.1.25623.1.0.802610">
|
7
|
+
<name>Oracle Java SE JRE Multiple Vulnerabilities - February 2012 (Windows - 01)</name>
|
8
|
+
<cvss_base>10.0</cvss_base>
|
9
|
+
<risk_factor>Critical</risk_factor>
|
10
|
+
<cve>CVE-2011-3563, CVE-2012-0499, CVE-2012-0502, CVE-2012-0503, CVE-2012-0505, CVE-2012-0506</cve>
|
11
|
+
<bid>52011, 52012, 52014, 52016, 52017, 52018</bid>
|
12
|
+
<xref>URL:http://secunia.com/advisories/48009, URL:http://www.pre-cert.de/advisories/PRE-SA-2012-01.txt, URL:http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html, URL:http://www.oracle.com/technetwork/java/javase/documentation/overview-142120.html, URL:http://www.oracle.com/technetwork/java/javase/documentation/overview-137139.html</xref>
|
13
|
+
</nvt>
|
14
|
+
<threat>High</threat>
|
15
|
+
<description>
|
16
|
+
Summary:
|
17
|
+
This host is installed with Oracle Java SE JRE and is prone to
|
18
|
+
multiple vulnerabilities.
|
19
|
+
|
20
|
+
Vulnerability Insight:
|
21
|
+
Multiple flaws are caused by unspecified errors in the following
|
22
|
+
components:
|
23
|
+
- 2D
|
24
|
+
- AWT
|
25
|
+
- Sound
|
26
|
+
- I18n
|
27
|
+
- CORBA
|
28
|
+
- Serialization
|
29
|
+
|
30
|
+
Impact:
|
31
|
+
Successful exploitation allows remote attackers to affect confidentiality,
|
32
|
+
integrity, and availability via unknown vectors.
|
33
|
+
|
34
|
+
Impact Level: System/Application
|
35
|
+
|
36
|
+
Affected Software/OS:
|
37
|
+
Oracle Java SE JRE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33
|
38
|
+
and earlier, and 1.4.2_35 and earlier
|
39
|
+
|
40
|
+
Solution:
|
41
|
+
Upgrade to Oracle Java SE JRE versions 7 Update 3, 6 Update 31, 5.0 Update
|
42
|
+
34, 1.4.2_36 or later. For updates refer to
|
43
|
+
http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html
|
44
|
+
</description>
|
45
|
+
<original_threat>High</original_threat>
|
46
|
+
<notes/>
|
47
|
+
<overrides/>
|
48
|
+
</result>
|
@@ -0,0 +1,68 @@
|
|
1
|
+
<?xml version="1.0"?>
|
2
|
+
<result id="32249f6c-89f1-4a93-888f-29404b01374f">
|
3
|
+
<subnet>188.111.11.85</subnet>
|
4
|
+
<host>188.111.11.85</host>
|
5
|
+
<port>http (80/tcp)</port>
|
6
|
+
<nvt oid="1.3.6.1.4.1.25623.1.0.103122">
|
7
|
+
<name>Apache Web Server ETag Header Information Disclosure Weakness</name>
|
8
|
+
<family>Web application abuses</family>
|
9
|
+
<cvss_base>4.3</cvss_base>
|
10
|
+
<risk_factor>Medium</risk_factor>
|
11
|
+
<cve>CVE-2003-1418</cve>
|
12
|
+
<bid>6939</bid>
|
13
|
+
<tags>cvss_base_vector=AV:N/AC:M/Au:N/C:P/I:N/A:N|summary=A weakness has been discovered in Apache web servers that are
|
14
|
+
configured to use the FileETag directive. Due to the way in which
|
15
|
+
Apache generates ETag response headers, it may be possible for an
|
16
|
+
attacker to obtain sensitive information regarding server files.
|
17
|
+
Specifically, ETag header fields returned to a client contain the
|
18
|
+
file's inode number.
|
19
|
+
|
20
|
+
Exploitation of this issue may provide an attacker with information
|
21
|
+
that may be used to launch further attacks against a target network.
|
22
|
+
|
23
|
+
OpenBSD has released a patch that addresses this issue. Inode numbers
|
24
|
+
returned from the server are now encoded using a private hash to avoid
|
25
|
+
the release of sensitive information.|solution=OpenBSD has released a patch to address this issue.
|
26
|
+
|
27
|
+
Novell has released TID10090670 to advise users to apply the available
|
28
|
+
workaround of disabling the directive in the configuration file for
|
29
|
+
Apache releases on NetWare. Please see the attached Technical
|
30
|
+
Information Document for further details.</tags>
|
31
|
+
<cert>
|
32
|
+
<warning>database not available</warning>
|
33
|
+
</cert>
|
34
|
+
<xref>URL:https://www.securityfocus.com/bid/6939, URL:http://httpd.apache.org/docs/mod/core.html#fileetag, URL:http://www.openbsd.org/errata32.html, URL:http://support.novell.com/docs/Tids/Solutions/10090670.html</xref>
|
35
|
+
</nvt>
|
36
|
+
<threat>Medium</threat>
|
37
|
+
<description>
|
38
|
+
Summary:
|
39
|
+
A weakness has been discovered in Apache web servers that are
|
40
|
+
configured to use the FileETag directive. Due to the way in which
|
41
|
+
Apache generates ETag response headers, it may be possible for an
|
42
|
+
attacker to obtain sensitive information regarding server files.
|
43
|
+
Specifically, ETag header fields returned to a client contain the
|
44
|
+
file's inode number.
|
45
|
+
|
46
|
+
Exploitation of this issue may provide an attacker with information
|
47
|
+
that may be used to launch further attacks against a target network.
|
48
|
+
|
49
|
+
OpenBSD has released a patch that addresses this issue. Inode numbers
|
50
|
+
returned from the server are now encoded using a private hash to avoid
|
51
|
+
the release of sensitive information.
|
52
|
+
Solution:
|
53
|
+
OpenBSD has released a patch to address this issue.
|
54
|
+
|
55
|
+
Novell has released TID10090670 to advise users to apply the available
|
56
|
+
workaround of disabling the directive in the configuration file for
|
57
|
+
Apache releases on NetWare. Please see the attached Technical
|
58
|
+
Information Document for further details.
|
59
|
+
|
60
|
+
Information that was gathered:
|
61
|
+
Inode: 1050855
|
62
|
+
Size: 177
|
63
|
+
|
64
|
+
</description>
|
65
|
+
<original_threat>Medium</original_threat>
|
66
|
+
<notes/>
|
67
|
+
<overrides/>
|
68
|
+
</result>
|
@@ -0,0 +1,427 @@
|
|
1
|
+
<?xml version="1.0"?>
|
2
|
+
<report id="f3732b63-5257-452b-91a1-b69db4ae7261" format_id="a994b278-1f62-11e1-96ac-406186ea4fc5" extension="xml" type="scan" content_type="text/xml">
|
3
|
+
<owner>
|
4
|
+
<name/>
|
5
|
+
</owner>
|
6
|
+
<name>2014-09-20T03:55:33Z</name>
|
7
|
+
<comment/>
|
8
|
+
<creation_time>2014-09-20T03:55:33Z</creation_time>
|
9
|
+
<modification_time>2014-09-20T05:09:20Z</modification_time>
|
10
|
+
<writable>0</writable>
|
11
|
+
<in_use>0</in_use>
|
12
|
+
<report id="f3732b63-5257-452b-91a1-b69db4ae7261">
|
13
|
+
<report_format/>
|
14
|
+
<sort>
|
15
|
+
<field>severity<order>descending</order></field>
|
16
|
+
</sort>
|
17
|
+
<filters id="0">hmlg<term>sort-reverse=severity result_hosts_only=1 min_cvss_base= levels=hmlg autofp=0 notes=1 overrides=1 first=1 rows=50 delta_states=gn</term><phrase/><autofp>0</autofp><notes>1</notes><overrides>1</overrides><apply_overrides>1</apply_overrides><result_hosts_only>1</result_hosts_only><min_cvss_base/><filter>High</filter><filter>Medium</filter><filter>Low</filter><filter>Log</filter></filters>
|
18
|
+
<severity_class id="d4c74cda-89e1-11e3-9c29-406186ea4fc5">
|
19
|
+
<name>nist</name>
|
20
|
+
<full_name>NVD Vulnerability Severity Ratings</full_name>
|
21
|
+
<severity_range>
|
22
|
+
<name>None</name>
|
23
|
+
<min>0.0</min>
|
24
|
+
<max>0.0</max>
|
25
|
+
</severity_range>
|
26
|
+
<severity_range>
|
27
|
+
<name>Low</name>
|
28
|
+
<min>0.1</min>
|
29
|
+
<max>3.9</max>
|
30
|
+
</severity_range>
|
31
|
+
<severity_range>
|
32
|
+
<name>Medium</name>
|
33
|
+
<min>4.0</min>
|
34
|
+
<max>6.9</max>
|
35
|
+
</severity_range>
|
36
|
+
<severity_range>
|
37
|
+
<name>High</name>
|
38
|
+
<min>7.0</min>
|
39
|
+
<max>10.0</max>
|
40
|
+
</severity_range>
|
41
|
+
</severity_class>
|
42
|
+
<user_tags>
|
43
|
+
<count>0</count>
|
44
|
+
</user_tags>
|
45
|
+
<scan_run_status>Done</scan_run_status>
|
46
|
+
<hosts>
|
47
|
+
<count>1</count>
|
48
|
+
</hosts>
|
49
|
+
<closed_cves>
|
50
|
+
<count>0</count>
|
51
|
+
</closed_cves>
|
52
|
+
<vulns>
|
53
|
+
<count>30</count>
|
54
|
+
</vulns>
|
55
|
+
<os>
|
56
|
+
<count>1</count>
|
57
|
+
</os>
|
58
|
+
<apps>
|
59
|
+
<count>2</count>
|
60
|
+
</apps>
|
61
|
+
<ssl_certs>
|
62
|
+
<count>4</count>
|
63
|
+
</ssl_certs>
|
64
|
+
<task id="27ea49cb-96a2-4eff-b1b1-6f41bac3178d">
|
65
|
+
<name>10.10.10.10</name>
|
66
|
+
<comment/>
|
67
|
+
<target id="f8a7cd4b-10df-4ccd-928c-91f286d74463">
|
68
|
+
<trash>0</trash>
|
69
|
+
</target>
|
70
|
+
<progress>-1</progress>
|
71
|
+
</task>
|
72
|
+
<scan>
|
73
|
+
<task>
|
74
|
+
<slave id="">
|
75
|
+
<name/>
|
76
|
+
<host/>
|
77
|
+
<port>0</port>
|
78
|
+
</slave>
|
79
|
+
<preferences>
|
80
|
+
<preference>
|
81
|
+
<name>Network Source Interface</name>
|
82
|
+
<scanner_name>source_iface</scanner_name>
|
83
|
+
<value/>
|
84
|
+
</preference>
|
85
|
+
</preferences>
|
86
|
+
</task>
|
87
|
+
</scan>
|
88
|
+
<timestamp>2014-09-20T03:55:32Z</timestamp>
|
89
|
+
<scan_start>2014-09-20T03:55:33Z</scan_start>
|
90
|
+
<ports max="50" start="1">
|
91
|
+
<count>7</count>
|
92
|
+
<port>1443/tcp<host>10.10.10.10</host><severity>6.8</severity><threat>Medium</threat></port>
|
93
|
+
<port>8443/tcp<host>10.10.10.10</host><severity>6.4</severity><threat>Medium</threat></port>
|
94
|
+
<port>3390/tcp<host>10.10.10.10</host><severity>5.0</severity><threat>Medium</threat></port>
|
95
|
+
<port>443/tcp<host>10.10.10.10</host><severity>4.3</severity><threat>Medium</threat></port>
|
96
|
+
<port>general/tcp<host>10.10.10.10</host><severity>2.6</severity><threat>Low</threat></port>
|
97
|
+
<port>general/CPE-T<host>10.10.10.10</host><severity>0.0</severity><threat>Log</threat></port>
|
98
|
+
<port>541/tcp<host>10.10.10.10</host><severity>0.0</severity><threat>Log</threat></port>
|
99
|
+
<port>3391/tcp<host>10.10.10.10</host><severity>0.0</severity><threat>Log</threat></port>
|
100
|
+
<port>25/tcp<host>10.10.10.10</host><severity>0.0</severity><threat>Log</threat></port>
|
101
|
+
</ports>
|
102
|
+
<results max="50" start="1">
|
103
|
+
<result id="e68f58e5-1451-43ca-a279-395904bbe03f">
|
104
|
+
<user_tags>
|
105
|
+
<count>0</count>
|
106
|
+
</user_tags>
|
107
|
+
<host>10.10.10.10</host>
|
108
|
+
<port>1443/tcp</port>
|
109
|
+
<nvt oid="1.3.6.1.4.1.25623.1.0.105042">
|
110
|
+
<name>OpenSSL CCS Man in the Middle Security Bypass Vulnerability</name>
|
111
|
+
<family>General</family>
|
112
|
+
<cvss_base>6.8</cvss_base>
|
113
|
+
<cve>CVE-2014-0224</cve>
|
114
|
+
<bid>67899</bid>
|
115
|
+
<tags>cvss_base_vector=AV:N/AC:M/Au:N/C:P/I:P/A:P|impact=Successfully exploiting this issue may allow attackers to obtain
|
116
|
+
sensitive information by conducting a man-in-the-middle attack. This
|
117
|
+
may lead to other attacks.|vuldetect=Send two SSL ChangeCipherSpec request and check the response.|insight=OpenSSL does not properly restrict processing of ChangeCipherSpec
|
118
|
+
messages, which allows man-in-the-middle attackers to trigger use of a
|
119
|
+
zero-length master key in certain OpenSSL-to-OpenSSL communications, and
|
120
|
+
consequently hijack sessions or obtain sensitive information, via a crafted
|
121
|
+
TLS handshake, aka the 'CCS Injection' vulnerability.|solution=Updates are available.|summary=OpenSSL is prone to security-bypass vulnerability.|affected=OpenSSL before 0.9.8za,
|
122
|
+
1.0.0 before 1.0.0m and
|
123
|
+
1.0.1 before 1.0.1h</tags>
|
124
|
+
<cert>
|
125
|
+
<cert_ref id="DFN-CERT-2014-1209" type="DFN-CERT"/>
|
126
|
+
<cert_ref id="DFN-CERT-2014-0917" type="DFN-CERT"/>
|
127
|
+
<cert_ref id="DFN-CERT-2014-0789" type="DFN-CERT"/>
|
128
|
+
<cert_ref id="DFN-CERT-2014-0778" type="DFN-CERT"/>
|
129
|
+
<cert_ref id="DFN-CERT-2014-0768" type="DFN-CERT"/>
|
130
|
+
<cert_ref id="DFN-CERT-2014-0752" type="DFN-CERT"/>
|
131
|
+
<cert_ref id="DFN-CERT-2014-0747" type="DFN-CERT"/>
|
132
|
+
<cert_ref id="DFN-CERT-2014-0738" type="DFN-CERT"/>
|
133
|
+
<cert_ref id="DFN-CERT-2014-0715" type="DFN-CERT"/>
|
134
|
+
<cert_ref id="DFN-CERT-2014-0714" type="DFN-CERT"/>
|
135
|
+
<cert_ref id="DFN-CERT-2014-0709" type="DFN-CERT"/>
|
136
|
+
</cert>
|
137
|
+
<xref>URL:http://www.securityfocus.com/bid/67899, URL:http://openssl.org/</xref>
|
138
|
+
</nvt>
|
139
|
+
<scan_nvt_version>$Revision: 494 $</scan_nvt_version>
|
140
|
+
<threat>Medium</threat>
|
141
|
+
<severity>6.8</severity>
|
142
|
+
<description/>
|
143
|
+
<original_threat>Medium</original_threat>
|
144
|
+
<original_severity>6.8</original_severity>
|
145
|
+
<notes/>
|
146
|
+
<overrides/>
|
147
|
+
</result>
|
148
|
+
<result id="4e116de0-992f-43b8-bf7b-3305d7192302">
|
149
|
+
<user_tags>
|
150
|
+
<count>0</count>
|
151
|
+
</user_tags>
|
152
|
+
<detection>
|
153
|
+
<result id="16c22b77-123d-4e35-bb84-699552c80400">
|
154
|
+
<details>
|
155
|
+
<detail>
|
156
|
+
<name>product</name>
|
157
|
+
<value>cpe:/a:apache:tomcat:6.0.26</value>
|
158
|
+
</detail>
|
159
|
+
<detail>
|
160
|
+
<name>location</name>
|
161
|
+
<value>8443/tcp</value>
|
162
|
+
</detail>
|
163
|
+
<detail>
|
164
|
+
<name>source_oid</name>
|
165
|
+
<value>1.3.6.1.4.1.25623.1.0.800371</value>
|
166
|
+
</detail>
|
167
|
+
<detail>
|
168
|
+
<name>source_name</name>
|
169
|
+
<value>Apache Tomcat Version Detection</value>
|
170
|
+
</detail>
|
171
|
+
</details>
|
172
|
+
</result>
|
173
|
+
</detection>
|
174
|
+
<host>10.10.10.10</host>
|
175
|
+
<port>8443/tcp</port>
|
176
|
+
<nvt oid="1.3.6.1.4.1.25623.1.0.100712">
|
177
|
+
<name>Apache Tomcat 'Transfer-Encoding' Information Disclosure and Denial Of Service Vulnerabilities</name>
|
178
|
+
<family>Web Servers</family>
|
179
|
+
<cvss_base>6.4</cvss_base>
|
180
|
+
<cve>CVE-2010-2227</cve>
|
181
|
+
<bid>41544</bid>
|
182
|
+
<tags>cvss_base_vector=AV:N/AC:L/Au:N/C:P/I:N/A:P|solution=The vendor released updates. Please see the references for more
|
183
|
+
information.|summary=Apache Tomcat is prone to multiple remote vulnerabilities including
|
184
|
+
information-disclosure and denial-of-service issues.
|
185
|
+
|
186
|
+
Remote attackers can exploit these issues to cause denial-of-service
|
187
|
+
conditions or gain access to potentially sensitive information
|
188
|
+
|
189
|
+
information obtained may lead to further attacks.
|
190
|
+
|
191
|
+
The following versions are affected:
|
192
|
+
|
193
|
+
Tomcat 5.5.0 to 5.5.29 Tomcat 6.0.0 to 6.0.27 Tomcat 7.0.0
|
194
|
+
|
195
|
+
Tomcat 3.x, 4.x, and 5.0.x may also be affected.</tags>
|
196
|
+
<cert>
|
197
|
+
<cert_ref id="DFN-CERT-2012-1832" type="DFN-CERT"/>
|
198
|
+
<cert_ref id="DFN-CERT-2012-0828" type="DFN-CERT"/>
|
199
|
+
<cert_ref id="DFN-CERT-2011-0465" type="DFN-CERT"/>
|
200
|
+
<cert_ref id="DFN-CERT-2011-0185" type="DFN-CERT"/>
|
201
|
+
<cert_ref id="DFN-CERT-2010-1647" type="DFN-CERT"/>
|
202
|
+
<cert_ref id="DFN-CERT-2010-1607" type="DFN-CERT"/>
|
203
|
+
<cert_ref id="DFN-CERT-2010-1560" type="DFN-CERT"/>
|
204
|
+
<cert_ref id="DFN-CERT-2010-1472" type="DFN-CERT"/>
|
205
|
+
<cert_ref id="DFN-CERT-2010-1247" type="DFN-CERT"/>
|
206
|
+
<cert_ref id="DFN-CERT-2010-1192" type="DFN-CERT"/>
|
207
|
+
<cert_ref id="DFN-CERT-2010-1190" type="DFN-CERT"/>
|
208
|
+
<cert_ref id="DFN-CERT-2010-0986" type="DFN-CERT"/>
|
209
|
+
<cert_ref id="DFN-CERT-2010-0985" type="DFN-CERT"/>
|
210
|
+
<cert_ref id="DFN-CERT-2010-0983" type="DFN-CERT"/>
|
211
|
+
</cert>
|
212
|
+
<xref>URL:https://www.securityfocus.com/bid/41544, URL:http://tomcat.apache.org/security-5.html, URL:http://tomcat.apache.org/security-6.html, URL:http://tomcat.apache.org/security-7.html, URL:http://tomcat.apache.org/, URL:http://www.securityfocus.com/archive/1/512272</xref>
|
213
|
+
</nvt>
|
214
|
+
<scan_nvt_version>$Revision: 14 $</scan_nvt_version>
|
215
|
+
<threat>Medium</threat>
|
216
|
+
<severity>6.4</severity>
|
217
|
+
<description/>
|
218
|
+
<original_threat>Medium</original_threat>
|
219
|
+
<original_severity>6.4</original_severity>
|
220
|
+
<notes/>
|
221
|
+
<overrides/>
|
222
|
+
</result>
|
223
|
+
<result id="c7809bd8-e17d-4602-89c9-66a391638f20">
|
224
|
+
<user_tags>
|
225
|
+
<count>0</count>
|
226
|
+
</user_tags>
|
227
|
+
<host>10.10.10.10</host>
|
228
|
+
<port>3390/tcp</port>
|
229
|
+
<nvt oid="1.3.6.1.4.1.25623.1.0.103955">
|
230
|
+
<name>SSL Certification Expired</name>
|
231
|
+
<family>General</family>
|
232
|
+
<cvss_base>5.0</cvss_base>
|
233
|
+
<cve>NOCVE</cve>
|
234
|
+
<bid>NOBID</bid>
|
235
|
+
<tags>cvss_base_vector=AV:N/AC:L/Au:N/C:N/I:P/A:N|insight=This script checks expiry dates of certificates associated with
|
236
|
+
SSL-enabled services on the target and reports whether any have already
|
237
|
+
expired.|solution=Replace the SSL certificate by a new one.|summary=The remote server's SSL certificate has already expired.</tags>
|
238
|
+
<cert/>
|
239
|
+
<xref>NOXREF</xref>
|
240
|
+
</nvt>
|
241
|
+
<scan_nvt_version>$Revision: 626 $</scan_nvt_version>
|
242
|
+
<threat>Medium</threat>
|
243
|
+
<severity>5.0</severity>
|
244
|
+
<description>Expired Certificates:\
|
245
|
+
\
|
246
|
+
\
|
247
|
+
The SSL certificate on the remote service expired on 2014-03-22 09:52:56
|
248
|
+
Certificate details:
|
249
|
+
subject ...: CN=office.domain.com,OU=Client,O=Client,L=null,ST=MB,C=CA
|
250
|
+
issued by .: CN=office.domain.com,OU=Client,O=Client,L=null,ST=MB,C=CA
|
251
|
+
serial ....: 4F685378
|
252
|
+
valid from : 2012-03-20 09:52:56 UTC
|
253
|
+
valid until: 2014-03-22 09:52:56 UTC
|
254
|
+
fingerprint: 0C699AFA6640A42A199C7926F32CFBDA8FA0936C
|
255
|
+
</description>
|
256
|
+
<original_threat>Medium</original_threat>
|
257
|
+
<original_severity>5.0</original_severity>
|
258
|
+
<notes/>
|
259
|
+
<overrides/>
|
260
|
+
</result>
|
261
|
+
<result id="316bfba3-3fa4-46a7-83e4-ace6ac6f109b">
|
262
|
+
<user_tags>
|
263
|
+
<count>0</count>
|
264
|
+
</user_tags>
|
265
|
+
<host>10.10.10.10</host>
|
266
|
+
<port>443/tcp</port>
|
267
|
+
<nvt oid="1.3.6.1.4.1.25623.1.0.103440">
|
268
|
+
<name>Check for SSL Weak Ciphers</name>
|
269
|
+
<family>General</family>
|
270
|
+
<cvss_base>4.3</cvss_base>
|
271
|
+
<cve>NOCVE</cve>
|
272
|
+
<bid>NOBID</bid>
|
273
|
+
<tags>cvss_base_vector=AV:N/AC:M/Au:N/C:P/I:N/A:N|summary=This routine search for weak SSL ciphers offered by a service.|solution=The configuration of this services should be changed so
|
274
|
+
that it does not support the listed weak ciphers anymore.|insight=These rules are applied for the evaluation of the cryptographic strength:
|
275
|
+
|
276
|
+
- Any SSL/TLS using no cipher is considered weak.
|
277
|
+
|
278
|
+
- All SSLv2 ciphers are considered weak due to a design flaw within the SSLv2 protocol.
|
279
|
+
|
280
|
+
- RC4 is considered to be weak.
|
281
|
+
|
282
|
+
- Ciphers using 64 bit or less are considered to be vulnerable to brute force methods
|
283
|
+
and therefore considered as weak.
|
284
|
+
|
285
|
+
- 1024 bit RSA authentication is considered to be insecure and therefore as weak.
|
286
|
+
|
287
|
+
- CBC ciphers in TLS < 1.2 are considered to be vulnerable to the BEAST or Lucky 13 attacks
|
288
|
+
|
289
|
+
- Any cipher considered to be secure for only the next 10 years is considered as medium
|
290
|
+
|
291
|
+
- Any other cipher is considered as strong</tags>
|
292
|
+
<cert/>
|
293
|
+
<xref>NOXREF</xref>
|
294
|
+
</nvt>
|
295
|
+
<scan_nvt_version>$Revision: 342 $</scan_nvt_version>
|
296
|
+
<threat>Medium</threat>
|
297
|
+
<severity>4.3</severity>
|
298
|
+
<description>
|
299
|
+
|
300
|
+
Weak ciphers offered by this service:
|
301
|
+
SSL3_RSA_RC4_128_MD5
|
302
|
+
SSL3_RSA_RC4_128_SHA
|
303
|
+
TLS1_RSA_RC4_128_MD5
|
304
|
+
TLS1_RSA_RC4_128_SHA
|
305
|
+
</description>
|
306
|
+
<original_threat>Medium</original_threat>
|
307
|
+
<original_severity>4.3</original_severity>
|
308
|
+
<notes/>
|
309
|
+
<overrides/>
|
310
|
+
</result>
|
311
|
+
<result id="dda07a69-4a35-4ebf-a84b-1d98f179f8a9">
|
312
|
+
<user_tags>
|
313
|
+
<count>0</count>
|
314
|
+
</user_tags>
|
315
|
+
<host>10.10.10.10</host>
|
316
|
+
<port>1443/tcp</port>
|
317
|
+
<nvt oid="1.3.6.1.4.1.25623.1.0.103440">
|
318
|
+
<name>Check for SSL Weak Ciphers</name>
|
319
|
+
<family>General</family>
|
320
|
+
<cvss_base>4.3</cvss_base>
|
321
|
+
<cve>NOCVE</cve>
|
322
|
+
<bid>NOBID</bid>
|
323
|
+
<tags>cvss_base_vector=AV:N/AC:M/Au:N/C:P/I:N/A:N|summary=This routine search for weak SSL ciphers offered by a service.|solution=The configuration of this services should be changed so
|
324
|
+
that it does not support the listed weak ciphers anymore.|insight=These rules are applied for the evaluation of the cryptographic strength:
|
325
|
+
|
326
|
+
- Any SSL/TLS using no cipher is considered weak.
|
327
|
+
|
328
|
+
- All SSLv2 ciphers are considered weak due to a design flaw within the SSLv2 protocol.
|
329
|
+
|
330
|
+
- RC4 is considered to be weak.
|
331
|
+
|
332
|
+
- Ciphers using 64 bit or less are considered to be vulnerable to brute force methods
|
333
|
+
and therefore considered as weak.
|
334
|
+
|
335
|
+
- 1024 bit RSA authentication is considered to be insecure and therefore as weak.
|
336
|
+
|
337
|
+
- CBC ciphers in TLS < 1.2 are considered to be vulnerable to the BEAST or Lucky 13 attacks
|
338
|
+
|
339
|
+
- Any cipher considered to be secure for only the next 10 years is considered as medium
|
340
|
+
|
341
|
+
- Any other cipher is considered as strong</tags>
|
342
|
+
<cert/>
|
343
|
+
<xref>NOXREF</xref>
|
344
|
+
</nvt>
|
345
|
+
<scan_nvt_version>$Revision: 342 $</scan_nvt_version>
|
346
|
+
<threat>Medium</threat>
|
347
|
+
<severity>4.3</severity>
|
348
|
+
<description>
|
349
|
+
|
350
|
+
Weak ciphers offered by this service:
|
351
|
+
SSL3_RSA_RC4_128_MD5
|
352
|
+
SSL3_RSA_RC4_128_SHA
|
353
|
+
SSL3_RSA_DES_64_CBC_SHA
|
354
|
+
SSL3_EDH_RSA_DES_64_CBC_SHA
|
355
|
+
SSL3_RSA_WITH_SEED_SHA
|
356
|
+
TLS1_RSA_RC4_128_MD5
|
357
|
+
TLS1_RSA_RC4_128_SHA
|
358
|
+
TLS1_RSA_DES_64_CBC_SHA
|
359
|
+
TLS1_EDH_RSA_DES_64_CBC_SHA
|
360
|
+
</description>
|
361
|
+
<original_threat>Medium</original_threat>
|
362
|
+
<original_severity>4.3</original_severity>
|
363
|
+
<notes/>
|
364
|
+
<overrides/>
|
365
|
+
</result>
|
366
|
+
<result id="3e4674f3-a6a6-4d9c-b3e9-ff54222cecb6">
|
367
|
+
<user_tags>
|
368
|
+
<count>0</count>
|
369
|
+
</user_tags>
|
370
|
+
<detection>
|
371
|
+
<result id="16c22b77-123d-4e35-bb84-699552c80400">
|
372
|
+
<details>
|
373
|
+
<detail>
|
374
|
+
<name>product</name>
|
375
|
+
<value>cpe:/a:apache:tomcat:6.0.26</value>
|
376
|
+
</detail>
|
377
|
+
<detail>
|
378
|
+
<name>location</name>
|
379
|
+
<value>8443/tcp</value>
|
380
|
+
</detail>
|
381
|
+
<detail>
|
382
|
+
<name>source_oid</name>
|
383
|
+
<value>1.3.6.1.4.1.25623.1.0.800371</value>
|
384
|
+
</detail>
|
385
|
+
<detail>
|
386
|
+
<name>source_name</name>
|
387
|
+
<value>Apache Tomcat Version Detection</value>
|
388
|
+
</detail>
|
389
|
+
</details>
|
390
|
+
</result>
|
391
|
+
</detection>
|
392
|
+
<host>10.10.10.10</host>
|
393
|
+
<port>8443/tcp</port>
|
394
|
+
<nvt oid="1.3.6.1.4.1.25623.1.0.103032">
|
395
|
+
<name>Apache Tomcat 'sort' and 'orderBy' Parameters Cross Site Scripting Vulnerabilities</name>
|
396
|
+
<family>Web Servers</family>
|
397
|
+
<cvss_base>4.3</cvss_base>
|
398
|
+
<cve>CVE-2010-4172</cve>
|
399
|
+
<bid>45015</bid>
|
400
|
+
<tags>cvss_base_vector=AV:N/AC:M/Au:N/C:N/I:P/A:N|solution=Updates are available
|
401
|
+
please see the references for more information.|summary=Apache Tomcat is prone to multiple cross-site scripting
|
402
|
+
vulnerabilities because it fails to properly sanitize user-
|
403
|
+
supplied input.
|
404
|
+
|
405
|
+
An attacker may leverage these issues to execute arbitrary script code
|
406
|
+
in the browser of an unsuspecting user in the context of the affected
|
407
|
+
site. This may let the attacker steal cookie-based authentication
|
408
|
+
credentials and launch other attacks.</tags>
|
409
|
+
<cert>
|
410
|
+
<cert_ref id="DFN-CERT-2012-1832" type="DFN-CERT"/>
|
411
|
+
<cert_ref id="DFN-CERT-2011-0793" type="DFN-CERT"/>
|
412
|
+
<cert_ref id="DFN-CERT-2011-0181" type="DFN-CERT"/>
|
413
|
+
</cert>
|
414
|
+
<xref>URL:https://www.securityfocus.com/bid/45015, URL:http://tomcat.apache.org/security-6.html, URL:http://tomcat.apache.org/security-7.html, URL:http://tomcat.apache.org/security-6.html, URL:http://tomcat.apache.org/security-7.html, URL:http://jakarta.apache.org/tomcat/, URL:http://www.securityfocus.com/archive/1/514866</xref>
|
415
|
+
</nvt>
|
416
|
+
<scan_nvt_version>$Revision: 13 $</scan_nvt_version>
|
417
|
+
<threat>Medium</threat>
|
418
|
+
<severity>4.3</severity>
|
419
|
+
<description/>
|
420
|
+
<original_threat>Medium</original_threat>
|
421
|
+
<original_severity>4.3</original_severity>
|
422
|
+
<notes/>
|
423
|
+
<overrides/>
|
424
|
+
</result>
|
425
|
+
</results>
|
426
|
+
</report>
|
427
|
+
</report>
|