dradis-openvas 3.6.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,26 @@
1
+ class OpenVASTasks < Thor
2
+ include Rails.application.config.dradis.thor_helper_module
3
+
4
+ namespace "dradis:plugins:openvas"
5
+
6
+ desc "upload FILE", "upload OpenVAS XML results"
7
+ def upload(file_path)
8
+ require 'config/environment'
9
+
10
+ logger = Logger.new(STDOUT)
11
+ logger.level = Logger::DEBUG
12
+
13
+ unless File.exists?(file_path)
14
+ $stderr.puts "** the file [#{file_path}] does not exist"
15
+ exit -1
16
+ end
17
+
18
+ detect_and_set_project_scope
19
+
20
+ importer = Dradis::Plugins::OpenVAS::Importer.new(logger: logger)
21
+ importer.import(file: file_path)
22
+
23
+ logger.close
24
+ end
25
+
26
+ end
@@ -0,0 +1,48 @@
1
+ <?xml version="1.0"?>
2
+ <result id="e2ccf551-ea4e-4186-9b24-76287d6244f3">
3
+ <subnet>172.31.253.9</subnet>
4
+ <host>172.31.253.9</host>
5
+ <port>general/tcp</port>
6
+ <nvt oid="1.3.6.1.4.1.25623.1.0.802610">
7
+ <name>Oracle Java SE JRE Multiple Vulnerabilities - February 2012 (Windows - 01)</name>
8
+ <cvss_base>10.0</cvss_base>
9
+ <risk_factor>Critical</risk_factor>
10
+ <cve>CVE-2011-3563, CVE-2012-0499, CVE-2012-0502, CVE-2012-0503, CVE-2012-0505, CVE-2012-0506</cve>
11
+ <bid>52011, 52012, 52014, 52016, 52017, 52018</bid>
12
+ <xref>URL:http://secunia.com/advisories/48009, URL:http://www.pre-cert.de/advisories/PRE-SA-2012-01.txt, URL:http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html, URL:http://www.oracle.com/technetwork/java/javase/documentation/overview-142120.html, URL:http://www.oracle.com/technetwork/java/javase/documentation/overview-137139.html</xref>
13
+ </nvt>
14
+ <threat>High</threat>
15
+ <description>
16
+ Summary:
17
+ This host is installed with Oracle Java SE JRE and is prone to
18
+ multiple vulnerabilities.
19
+
20
+ Vulnerability Insight:
21
+ Multiple flaws are caused by unspecified errors in the following
22
+ components:
23
+ - 2D
24
+ - AWT
25
+ - Sound
26
+ - I18n
27
+ - CORBA
28
+ - Serialization
29
+
30
+ Impact:
31
+ Successful exploitation allows remote attackers to affect confidentiality,
32
+ integrity, and availability via unknown vectors.
33
+
34
+ Impact Level: System/Application
35
+
36
+ Affected Software/OS:
37
+ Oracle Java SE JRE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33
38
+ and earlier, and 1.4.2_35 and earlier
39
+
40
+ Solution:
41
+ Upgrade to Oracle Java SE JRE versions 7 Update 3, 6 Update 31, 5.0 Update
42
+ 34, 1.4.2_36 or later. For updates refer to
43
+ http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html
44
+ </description>
45
+ <original_threat>High</original_threat>
46
+ <notes/>
47
+ <overrides/>
48
+ </result>
@@ -0,0 +1,68 @@
1
+ <?xml version="1.0"?>
2
+ <result id="32249f6c-89f1-4a93-888f-29404b01374f">
3
+ <subnet>188.111.11.85</subnet>
4
+ <host>188.111.11.85</host>
5
+ <port>http (80/tcp)</port>
6
+ <nvt oid="1.3.6.1.4.1.25623.1.0.103122">
7
+ <name>Apache Web Server ETag Header Information Disclosure Weakness</name>
8
+ <family>Web application abuses</family>
9
+ <cvss_base>4.3</cvss_base>
10
+ <risk_factor>Medium</risk_factor>
11
+ <cve>CVE-2003-1418</cve>
12
+ <bid>6939</bid>
13
+ <tags>cvss_base_vector=AV:N/AC:M/Au:N/C:P/I:N/A:N|summary=A weakness has been discovered in Apache web servers that are
14
+ configured to use the FileETag directive. Due to the way in which
15
+ Apache generates ETag response headers, it may be possible for an
16
+ attacker to obtain sensitive information regarding server files.
17
+ Specifically, ETag header fields returned to a client contain the
18
+ file's inode number.
19
+
20
+ Exploitation of this issue may provide an attacker with information
21
+ that may be used to launch further attacks against a target network.
22
+
23
+ OpenBSD has released a patch that addresses this issue. Inode numbers
24
+ returned from the server are now encoded using a private hash to avoid
25
+ the release of sensitive information.|solution=OpenBSD has released a patch to address this issue.
26
+
27
+ Novell has released TID10090670 to advise users to apply the available
28
+ workaround of disabling the directive in the configuration file for
29
+ Apache releases on NetWare. Please see the attached Technical
30
+ Information Document for further details.</tags>
31
+ <cert>
32
+ <warning>database not available</warning>
33
+ </cert>
34
+ <xref>URL:https://www.securityfocus.com/bid/6939, URL:http://httpd.apache.org/docs/mod/core.html#fileetag, URL:http://www.openbsd.org/errata32.html, URL:http://support.novell.com/docs/Tids/Solutions/10090670.html</xref>
35
+ </nvt>
36
+ <threat>Medium</threat>
37
+ <description>
38
+ Summary:
39
+ A weakness has been discovered in Apache web servers that are
40
+ configured to use the FileETag directive. Due to the way in which
41
+ Apache generates ETag response headers, it may be possible for an
42
+ attacker to obtain sensitive information regarding server files.
43
+ Specifically, ETag header fields returned to a client contain the
44
+ file's inode number.
45
+
46
+ Exploitation of this issue may provide an attacker with information
47
+ that may be used to launch further attacks against a target network.
48
+
49
+ OpenBSD has released a patch that addresses this issue. Inode numbers
50
+ returned from the server are now encoded using a private hash to avoid
51
+ the release of sensitive information.
52
+ Solution:
53
+ OpenBSD has released a patch to address this issue.
54
+
55
+ Novell has released TID10090670 to advise users to apply the available
56
+ workaround of disabling the directive in the configuration file for
57
+ Apache releases on NetWare. Please see the attached Technical
58
+ Information Document for further details.
59
+
60
+ Information that was gathered:
61
+ Inode: 1050855
62
+ Size: 177
63
+
64
+ </description>
65
+ <original_threat>Medium</original_threat>
66
+ <notes/>
67
+ <overrides/>
68
+ </result>
@@ -0,0 +1,427 @@
1
+ <?xml version="1.0"?>
2
+ <report id="f3732b63-5257-452b-91a1-b69db4ae7261" format_id="a994b278-1f62-11e1-96ac-406186ea4fc5" extension="xml" type="scan" content_type="text/xml">
3
+ <owner>
4
+ <name/>
5
+ </owner>
6
+ <name>2014-09-20T03:55:33Z</name>
7
+ <comment/>
8
+ <creation_time>2014-09-20T03:55:33Z</creation_time>
9
+ <modification_time>2014-09-20T05:09:20Z</modification_time>
10
+ <writable>0</writable>
11
+ <in_use>0</in_use>
12
+ <report id="f3732b63-5257-452b-91a1-b69db4ae7261">
13
+ <report_format/>
14
+ <sort>
15
+ <field>severity<order>descending</order></field>
16
+ </sort>
17
+ <filters id="0">hmlg<term>sort-reverse=severity result_hosts_only=1 min_cvss_base= levels=hmlg autofp=0 notes=1 overrides=1 first=1 rows=50 delta_states=gn</term><phrase/><autofp>0</autofp><notes>1</notes><overrides>1</overrides><apply_overrides>1</apply_overrides><result_hosts_only>1</result_hosts_only><min_cvss_base/><filter>High</filter><filter>Medium</filter><filter>Low</filter><filter>Log</filter></filters>
18
+ <severity_class id="d4c74cda-89e1-11e3-9c29-406186ea4fc5">
19
+ <name>nist</name>
20
+ <full_name>NVD Vulnerability Severity Ratings</full_name>
21
+ <severity_range>
22
+ <name>None</name>
23
+ <min>0.0</min>
24
+ <max>0.0</max>
25
+ </severity_range>
26
+ <severity_range>
27
+ <name>Low</name>
28
+ <min>0.1</min>
29
+ <max>3.9</max>
30
+ </severity_range>
31
+ <severity_range>
32
+ <name>Medium</name>
33
+ <min>4.0</min>
34
+ <max>6.9</max>
35
+ </severity_range>
36
+ <severity_range>
37
+ <name>High</name>
38
+ <min>7.0</min>
39
+ <max>10.0</max>
40
+ </severity_range>
41
+ </severity_class>
42
+ <user_tags>
43
+ <count>0</count>
44
+ </user_tags>
45
+ <scan_run_status>Done</scan_run_status>
46
+ <hosts>
47
+ <count>1</count>
48
+ </hosts>
49
+ <closed_cves>
50
+ <count>0</count>
51
+ </closed_cves>
52
+ <vulns>
53
+ <count>30</count>
54
+ </vulns>
55
+ <os>
56
+ <count>1</count>
57
+ </os>
58
+ <apps>
59
+ <count>2</count>
60
+ </apps>
61
+ <ssl_certs>
62
+ <count>4</count>
63
+ </ssl_certs>
64
+ <task id="27ea49cb-96a2-4eff-b1b1-6f41bac3178d">
65
+ <name>10.10.10.10</name>
66
+ <comment/>
67
+ <target id="f8a7cd4b-10df-4ccd-928c-91f286d74463">
68
+ <trash>0</trash>
69
+ </target>
70
+ <progress>-1</progress>
71
+ </task>
72
+ <scan>
73
+ <task>
74
+ <slave id="">
75
+ <name/>
76
+ <host/>
77
+ <port>0</port>
78
+ </slave>
79
+ <preferences>
80
+ <preference>
81
+ <name>Network Source Interface</name>
82
+ <scanner_name>source_iface</scanner_name>
83
+ <value/>
84
+ </preference>
85
+ </preferences>
86
+ </task>
87
+ </scan>
88
+ <timestamp>2014-09-20T03:55:32Z</timestamp>
89
+ <scan_start>2014-09-20T03:55:33Z</scan_start>
90
+ <ports max="50" start="1">
91
+ <count>7</count>
92
+ <port>1443/tcp<host>10.10.10.10</host><severity>6.8</severity><threat>Medium</threat></port>
93
+ <port>8443/tcp<host>10.10.10.10</host><severity>6.4</severity><threat>Medium</threat></port>
94
+ <port>3390/tcp<host>10.10.10.10</host><severity>5.0</severity><threat>Medium</threat></port>
95
+ <port>443/tcp<host>10.10.10.10</host><severity>4.3</severity><threat>Medium</threat></port>
96
+ <port>general/tcp<host>10.10.10.10</host><severity>2.6</severity><threat>Low</threat></port>
97
+ <port>general/CPE-T<host>10.10.10.10</host><severity>0.0</severity><threat>Log</threat></port>
98
+ <port>541/tcp<host>10.10.10.10</host><severity>0.0</severity><threat>Log</threat></port>
99
+ <port>3391/tcp<host>10.10.10.10</host><severity>0.0</severity><threat>Log</threat></port>
100
+ <port>25/tcp<host>10.10.10.10</host><severity>0.0</severity><threat>Log</threat></port>
101
+ </ports>
102
+ <results max="50" start="1">
103
+ <result id="e68f58e5-1451-43ca-a279-395904bbe03f">
104
+ <user_tags>
105
+ <count>0</count>
106
+ </user_tags>
107
+ <host>10.10.10.10</host>
108
+ <port>1443/tcp</port>
109
+ <nvt oid="1.3.6.1.4.1.25623.1.0.105042">
110
+ <name>OpenSSL CCS Man in the Middle Security Bypass Vulnerability</name>
111
+ <family>General</family>
112
+ <cvss_base>6.8</cvss_base>
113
+ <cve>CVE-2014-0224</cve>
114
+ <bid>67899</bid>
115
+ <tags>cvss_base_vector=AV:N/AC:M/Au:N/C:P/I:P/A:P|impact=Successfully exploiting this issue may allow attackers to obtain
116
+ sensitive information by conducting a man-in-the-middle attack. This
117
+ may lead to other attacks.|vuldetect=Send two SSL ChangeCipherSpec request and check the response.|insight=OpenSSL does not properly restrict processing of ChangeCipherSpec
118
+ messages, which allows man-in-the-middle attackers to trigger use of a
119
+ zero-length master key in certain OpenSSL-to-OpenSSL communications, and
120
+ consequently hijack sessions or obtain sensitive information, via a crafted
121
+ TLS handshake, aka the 'CCS Injection' vulnerability.|solution=Updates are available.|summary=OpenSSL is prone to security-bypass vulnerability.|affected=OpenSSL before 0.9.8za,
122
+ 1.0.0 before 1.0.0m and
123
+ 1.0.1 before 1.0.1h</tags>
124
+ <cert>
125
+ <cert_ref id="DFN-CERT-2014-1209" type="DFN-CERT"/>
126
+ <cert_ref id="DFN-CERT-2014-0917" type="DFN-CERT"/>
127
+ <cert_ref id="DFN-CERT-2014-0789" type="DFN-CERT"/>
128
+ <cert_ref id="DFN-CERT-2014-0778" type="DFN-CERT"/>
129
+ <cert_ref id="DFN-CERT-2014-0768" type="DFN-CERT"/>
130
+ <cert_ref id="DFN-CERT-2014-0752" type="DFN-CERT"/>
131
+ <cert_ref id="DFN-CERT-2014-0747" type="DFN-CERT"/>
132
+ <cert_ref id="DFN-CERT-2014-0738" type="DFN-CERT"/>
133
+ <cert_ref id="DFN-CERT-2014-0715" type="DFN-CERT"/>
134
+ <cert_ref id="DFN-CERT-2014-0714" type="DFN-CERT"/>
135
+ <cert_ref id="DFN-CERT-2014-0709" type="DFN-CERT"/>
136
+ </cert>
137
+ <xref>URL:http://www.securityfocus.com/bid/67899, URL:http://openssl.org/</xref>
138
+ </nvt>
139
+ <scan_nvt_version>$Revision: 494 $</scan_nvt_version>
140
+ <threat>Medium</threat>
141
+ <severity>6.8</severity>
142
+ <description/>
143
+ <original_threat>Medium</original_threat>
144
+ <original_severity>6.8</original_severity>
145
+ <notes/>
146
+ <overrides/>
147
+ </result>
148
+ <result id="4e116de0-992f-43b8-bf7b-3305d7192302">
149
+ <user_tags>
150
+ <count>0</count>
151
+ </user_tags>
152
+ <detection>
153
+ <result id="16c22b77-123d-4e35-bb84-699552c80400">
154
+ <details>
155
+ <detail>
156
+ <name>product</name>
157
+ <value>cpe:/a:apache:tomcat:6.0.26</value>
158
+ </detail>
159
+ <detail>
160
+ <name>location</name>
161
+ <value>8443/tcp</value>
162
+ </detail>
163
+ <detail>
164
+ <name>source_oid</name>
165
+ <value>1.3.6.1.4.1.25623.1.0.800371</value>
166
+ </detail>
167
+ <detail>
168
+ <name>source_name</name>
169
+ <value>Apache Tomcat Version Detection</value>
170
+ </detail>
171
+ </details>
172
+ </result>
173
+ </detection>
174
+ <host>10.10.10.10</host>
175
+ <port>8443/tcp</port>
176
+ <nvt oid="1.3.6.1.4.1.25623.1.0.100712">
177
+ <name>Apache Tomcat 'Transfer-Encoding' Information Disclosure and Denial Of Service Vulnerabilities</name>
178
+ <family>Web Servers</family>
179
+ <cvss_base>6.4</cvss_base>
180
+ <cve>CVE-2010-2227</cve>
181
+ <bid>41544</bid>
182
+ <tags>cvss_base_vector=AV:N/AC:L/Au:N/C:P/I:N/A:P|solution=The vendor released updates. Please see the references for more
183
+ information.|summary=Apache Tomcat is prone to multiple remote vulnerabilities including
184
+ information-disclosure and denial-of-service issues.
185
+
186
+ Remote attackers can exploit these issues to cause denial-of-service
187
+ conditions or gain access to potentially sensitive information
188
+
189
+ information obtained may lead to further attacks.
190
+
191
+ The following versions are affected:
192
+
193
+ Tomcat 5.5.0 to 5.5.29 Tomcat 6.0.0 to 6.0.27 Tomcat 7.0.0
194
+
195
+ Tomcat 3.x, 4.x, and 5.0.x may also be affected.</tags>
196
+ <cert>
197
+ <cert_ref id="DFN-CERT-2012-1832" type="DFN-CERT"/>
198
+ <cert_ref id="DFN-CERT-2012-0828" type="DFN-CERT"/>
199
+ <cert_ref id="DFN-CERT-2011-0465" type="DFN-CERT"/>
200
+ <cert_ref id="DFN-CERT-2011-0185" type="DFN-CERT"/>
201
+ <cert_ref id="DFN-CERT-2010-1647" type="DFN-CERT"/>
202
+ <cert_ref id="DFN-CERT-2010-1607" type="DFN-CERT"/>
203
+ <cert_ref id="DFN-CERT-2010-1560" type="DFN-CERT"/>
204
+ <cert_ref id="DFN-CERT-2010-1472" type="DFN-CERT"/>
205
+ <cert_ref id="DFN-CERT-2010-1247" type="DFN-CERT"/>
206
+ <cert_ref id="DFN-CERT-2010-1192" type="DFN-CERT"/>
207
+ <cert_ref id="DFN-CERT-2010-1190" type="DFN-CERT"/>
208
+ <cert_ref id="DFN-CERT-2010-0986" type="DFN-CERT"/>
209
+ <cert_ref id="DFN-CERT-2010-0985" type="DFN-CERT"/>
210
+ <cert_ref id="DFN-CERT-2010-0983" type="DFN-CERT"/>
211
+ </cert>
212
+ <xref>URL:https://www.securityfocus.com/bid/41544, URL:http://tomcat.apache.org/security-5.html, URL:http://tomcat.apache.org/security-6.html, URL:http://tomcat.apache.org/security-7.html, URL:http://tomcat.apache.org/, URL:http://www.securityfocus.com/archive/1/512272</xref>
213
+ </nvt>
214
+ <scan_nvt_version>$Revision: 14 $</scan_nvt_version>
215
+ <threat>Medium</threat>
216
+ <severity>6.4</severity>
217
+ <description/>
218
+ <original_threat>Medium</original_threat>
219
+ <original_severity>6.4</original_severity>
220
+ <notes/>
221
+ <overrides/>
222
+ </result>
223
+ <result id="c7809bd8-e17d-4602-89c9-66a391638f20">
224
+ <user_tags>
225
+ <count>0</count>
226
+ </user_tags>
227
+ <host>10.10.10.10</host>
228
+ <port>3390/tcp</port>
229
+ <nvt oid="1.3.6.1.4.1.25623.1.0.103955">
230
+ <name>SSL Certification Expired</name>
231
+ <family>General</family>
232
+ <cvss_base>5.0</cvss_base>
233
+ <cve>NOCVE</cve>
234
+ <bid>NOBID</bid>
235
+ <tags>cvss_base_vector=AV:N/AC:L/Au:N/C:N/I:P/A:N|insight=This script checks expiry dates of certificates associated with
236
+ SSL-enabled services on the target and reports whether any have already
237
+ expired.|solution=Replace the SSL certificate by a new one.|summary=The remote server's SSL certificate has already expired.</tags>
238
+ <cert/>
239
+ <xref>NOXREF</xref>
240
+ </nvt>
241
+ <scan_nvt_version>$Revision: 626 $</scan_nvt_version>
242
+ <threat>Medium</threat>
243
+ <severity>5.0</severity>
244
+ <description>Expired Certificates:\
245
+ \
246
+ \
247
+ The SSL certificate on the remote service expired on 2014-03-22 09:52:56
248
+ Certificate details:
249
+ subject ...: CN=office.domain.com,OU=Client,O=Client,L=null,ST=MB,C=CA
250
+ issued by .: CN=office.domain.com,OU=Client,O=Client,L=null,ST=MB,C=CA
251
+ serial ....: 4F685378
252
+ valid from : 2012-03-20 09:52:56 UTC
253
+ valid until: 2014-03-22 09:52:56 UTC
254
+ fingerprint: 0C699AFA6640A42A199C7926F32CFBDA8FA0936C
255
+ </description>
256
+ <original_threat>Medium</original_threat>
257
+ <original_severity>5.0</original_severity>
258
+ <notes/>
259
+ <overrides/>
260
+ </result>
261
+ <result id="316bfba3-3fa4-46a7-83e4-ace6ac6f109b">
262
+ <user_tags>
263
+ <count>0</count>
264
+ </user_tags>
265
+ <host>10.10.10.10</host>
266
+ <port>443/tcp</port>
267
+ <nvt oid="1.3.6.1.4.1.25623.1.0.103440">
268
+ <name>Check for SSL Weak Ciphers</name>
269
+ <family>General</family>
270
+ <cvss_base>4.3</cvss_base>
271
+ <cve>NOCVE</cve>
272
+ <bid>NOBID</bid>
273
+ <tags>cvss_base_vector=AV:N/AC:M/Au:N/C:P/I:N/A:N|summary=This routine search for weak SSL ciphers offered by a service.|solution=The configuration of this services should be changed so
274
+ that it does not support the listed weak ciphers anymore.|insight=These rules are applied for the evaluation of the cryptographic strength:
275
+
276
+ - Any SSL/TLS using no cipher is considered weak.
277
+
278
+ - All SSLv2 ciphers are considered weak due to a design flaw within the SSLv2 protocol.
279
+
280
+ - RC4 is considered to be weak.
281
+
282
+ - Ciphers using 64 bit or less are considered to be vulnerable to brute force methods
283
+ and therefore considered as weak.
284
+
285
+ - 1024 bit RSA authentication is considered to be insecure and therefore as weak.
286
+
287
+ - CBC ciphers in TLS &lt; 1.2 are considered to be vulnerable to the BEAST or Lucky 13 attacks
288
+
289
+ - Any cipher considered to be secure for only the next 10 years is considered as medium
290
+
291
+ - Any other cipher is considered as strong</tags>
292
+ <cert/>
293
+ <xref>NOXREF</xref>
294
+ </nvt>
295
+ <scan_nvt_version>$Revision: 342 $</scan_nvt_version>
296
+ <threat>Medium</threat>
297
+ <severity>4.3</severity>
298
+ <description>
299
+
300
+ Weak ciphers offered by this service:
301
+ SSL3_RSA_RC4_128_MD5
302
+ SSL3_RSA_RC4_128_SHA
303
+ TLS1_RSA_RC4_128_MD5
304
+ TLS1_RSA_RC4_128_SHA
305
+ </description>
306
+ <original_threat>Medium</original_threat>
307
+ <original_severity>4.3</original_severity>
308
+ <notes/>
309
+ <overrides/>
310
+ </result>
311
+ <result id="dda07a69-4a35-4ebf-a84b-1d98f179f8a9">
312
+ <user_tags>
313
+ <count>0</count>
314
+ </user_tags>
315
+ <host>10.10.10.10</host>
316
+ <port>1443/tcp</port>
317
+ <nvt oid="1.3.6.1.4.1.25623.1.0.103440">
318
+ <name>Check for SSL Weak Ciphers</name>
319
+ <family>General</family>
320
+ <cvss_base>4.3</cvss_base>
321
+ <cve>NOCVE</cve>
322
+ <bid>NOBID</bid>
323
+ <tags>cvss_base_vector=AV:N/AC:M/Au:N/C:P/I:N/A:N|summary=This routine search for weak SSL ciphers offered by a service.|solution=The configuration of this services should be changed so
324
+ that it does not support the listed weak ciphers anymore.|insight=These rules are applied for the evaluation of the cryptographic strength:
325
+
326
+ - Any SSL/TLS using no cipher is considered weak.
327
+
328
+ - All SSLv2 ciphers are considered weak due to a design flaw within the SSLv2 protocol.
329
+
330
+ - RC4 is considered to be weak.
331
+
332
+ - Ciphers using 64 bit or less are considered to be vulnerable to brute force methods
333
+ and therefore considered as weak.
334
+
335
+ - 1024 bit RSA authentication is considered to be insecure and therefore as weak.
336
+
337
+ - CBC ciphers in TLS &lt; 1.2 are considered to be vulnerable to the BEAST or Lucky 13 attacks
338
+
339
+ - Any cipher considered to be secure for only the next 10 years is considered as medium
340
+
341
+ - Any other cipher is considered as strong</tags>
342
+ <cert/>
343
+ <xref>NOXREF</xref>
344
+ </nvt>
345
+ <scan_nvt_version>$Revision: 342 $</scan_nvt_version>
346
+ <threat>Medium</threat>
347
+ <severity>4.3</severity>
348
+ <description>
349
+
350
+ Weak ciphers offered by this service:
351
+ SSL3_RSA_RC4_128_MD5
352
+ SSL3_RSA_RC4_128_SHA
353
+ SSL3_RSA_DES_64_CBC_SHA
354
+ SSL3_EDH_RSA_DES_64_CBC_SHA
355
+ SSL3_RSA_WITH_SEED_SHA
356
+ TLS1_RSA_RC4_128_MD5
357
+ TLS1_RSA_RC4_128_SHA
358
+ TLS1_RSA_DES_64_CBC_SHA
359
+ TLS1_EDH_RSA_DES_64_CBC_SHA
360
+ </description>
361
+ <original_threat>Medium</original_threat>
362
+ <original_severity>4.3</original_severity>
363
+ <notes/>
364
+ <overrides/>
365
+ </result>
366
+ <result id="3e4674f3-a6a6-4d9c-b3e9-ff54222cecb6">
367
+ <user_tags>
368
+ <count>0</count>
369
+ </user_tags>
370
+ <detection>
371
+ <result id="16c22b77-123d-4e35-bb84-699552c80400">
372
+ <details>
373
+ <detail>
374
+ <name>product</name>
375
+ <value>cpe:/a:apache:tomcat:6.0.26</value>
376
+ </detail>
377
+ <detail>
378
+ <name>location</name>
379
+ <value>8443/tcp</value>
380
+ </detail>
381
+ <detail>
382
+ <name>source_oid</name>
383
+ <value>1.3.6.1.4.1.25623.1.0.800371</value>
384
+ </detail>
385
+ <detail>
386
+ <name>source_name</name>
387
+ <value>Apache Tomcat Version Detection</value>
388
+ </detail>
389
+ </details>
390
+ </result>
391
+ </detection>
392
+ <host>10.10.10.10</host>
393
+ <port>8443/tcp</port>
394
+ <nvt oid="1.3.6.1.4.1.25623.1.0.103032">
395
+ <name>Apache Tomcat 'sort' and 'orderBy' Parameters Cross Site Scripting Vulnerabilities</name>
396
+ <family>Web Servers</family>
397
+ <cvss_base>4.3</cvss_base>
398
+ <cve>CVE-2010-4172</cve>
399
+ <bid>45015</bid>
400
+ <tags>cvss_base_vector=AV:N/AC:M/Au:N/C:N/I:P/A:N|solution=Updates are available
401
+ please see the references for more information.|summary=Apache Tomcat is prone to multiple cross-site scripting
402
+ vulnerabilities because it fails to properly sanitize user-
403
+ supplied input.
404
+
405
+ An attacker may leverage these issues to execute arbitrary script code
406
+ in the browser of an unsuspecting user in the context of the affected
407
+ site. This may let the attacker steal cookie-based authentication
408
+ credentials and launch other attacks.</tags>
409
+ <cert>
410
+ <cert_ref id="DFN-CERT-2012-1832" type="DFN-CERT"/>
411
+ <cert_ref id="DFN-CERT-2011-0793" type="DFN-CERT"/>
412
+ <cert_ref id="DFN-CERT-2011-0181" type="DFN-CERT"/>
413
+ </cert>
414
+ <xref>URL:https://www.securityfocus.com/bid/45015, URL:http://tomcat.apache.org/security-6.html, URL:http://tomcat.apache.org/security-7.html, URL:http://tomcat.apache.org/security-6.html, URL:http://tomcat.apache.org/security-7.html, URL:http://jakarta.apache.org/tomcat/, URL:http://www.securityfocus.com/archive/1/514866</xref>
415
+ </nvt>
416
+ <scan_nvt_version>$Revision: 13 $</scan_nvt_version>
417
+ <threat>Medium</threat>
418
+ <severity>4.3</severity>
419
+ <description/>
420
+ <original_threat>Medium</original_threat>
421
+ <original_severity>4.3</original_severity>
422
+ <notes/>
423
+ <overrides/>
424
+ </result>
425
+ </results>
426
+ </report>
427
+ </report>