dradis-openvas 3.6.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +7 -0
- data/.gitignore +8 -0
- data/.rspec +2 -0
- data/CHANGELOG.md +3 -0
- data/CONTRIBUTING.md +3 -0
- data/Gemfile +23 -0
- data/Guardfile +8 -0
- data/LICENSE +339 -0
- data/README.md +29 -0
- data/Rakefile +2 -0
- data/dradis-openvas.gemspec +32 -0
- data/lib/dradis-openvas.rb +8 -0
- data/lib/dradis/plugins/openvas.rb +11 -0
- data/lib/dradis/plugins/openvas/engine.rb +9 -0
- data/lib/dradis/plugins/openvas/field_processor.rb +42 -0
- data/lib/dradis/plugins/openvas/gem_version.rb +19 -0
- data/lib/dradis/plugins/openvas/importer.rb +101 -0
- data/lib/dradis/plugins/openvas/version.rb +13 -0
- data/lib/openvas/result.rb +163 -0
- data/lib/openvas/v6/result.rb +12 -0
- data/lib/openvas/v7/result.rb +61 -0
- data/lib/tasks/thorfile.rb +26 -0
- data/spec/fixtures/files/result.xml +48 -0
- data/spec/fixtures/files/result2.xml +68 -0
- data/spec/fixtures/files/v7/report_v7.xml +427 -0
- data/spec/openvas/result_spec.rb +35 -0
- data/spec/spec_helper.rb +35 -0
- data/spec/support/fixture_loader.rb +5 -0
- data/templates/result.fields +18 -0
- data/templates/result.sample +48 -0
- data/templates/result.template +31 -0
- metadata +123 -0
@@ -0,0 +1,26 @@
|
|
1
|
+
class OpenVASTasks < Thor
|
2
|
+
include Rails.application.config.dradis.thor_helper_module
|
3
|
+
|
4
|
+
namespace "dradis:plugins:openvas"
|
5
|
+
|
6
|
+
desc "upload FILE", "upload OpenVAS XML results"
|
7
|
+
def upload(file_path)
|
8
|
+
require 'config/environment'
|
9
|
+
|
10
|
+
logger = Logger.new(STDOUT)
|
11
|
+
logger.level = Logger::DEBUG
|
12
|
+
|
13
|
+
unless File.exists?(file_path)
|
14
|
+
$stderr.puts "** the file [#{file_path}] does not exist"
|
15
|
+
exit -1
|
16
|
+
end
|
17
|
+
|
18
|
+
detect_and_set_project_scope
|
19
|
+
|
20
|
+
importer = Dradis::Plugins::OpenVAS::Importer.new(logger: logger)
|
21
|
+
importer.import(file: file_path)
|
22
|
+
|
23
|
+
logger.close
|
24
|
+
end
|
25
|
+
|
26
|
+
end
|
@@ -0,0 +1,48 @@
|
|
1
|
+
<?xml version="1.0"?>
|
2
|
+
<result id="e2ccf551-ea4e-4186-9b24-76287d6244f3">
|
3
|
+
<subnet>172.31.253.9</subnet>
|
4
|
+
<host>172.31.253.9</host>
|
5
|
+
<port>general/tcp</port>
|
6
|
+
<nvt oid="1.3.6.1.4.1.25623.1.0.802610">
|
7
|
+
<name>Oracle Java SE JRE Multiple Vulnerabilities - February 2012 (Windows - 01)</name>
|
8
|
+
<cvss_base>10.0</cvss_base>
|
9
|
+
<risk_factor>Critical</risk_factor>
|
10
|
+
<cve>CVE-2011-3563, CVE-2012-0499, CVE-2012-0502, CVE-2012-0503, CVE-2012-0505, CVE-2012-0506</cve>
|
11
|
+
<bid>52011, 52012, 52014, 52016, 52017, 52018</bid>
|
12
|
+
<xref>URL:http://secunia.com/advisories/48009, URL:http://www.pre-cert.de/advisories/PRE-SA-2012-01.txt, URL:http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html, URL:http://www.oracle.com/technetwork/java/javase/documentation/overview-142120.html, URL:http://www.oracle.com/technetwork/java/javase/documentation/overview-137139.html</xref>
|
13
|
+
</nvt>
|
14
|
+
<threat>High</threat>
|
15
|
+
<description>
|
16
|
+
Summary:
|
17
|
+
This host is installed with Oracle Java SE JRE and is prone to
|
18
|
+
multiple vulnerabilities.
|
19
|
+
|
20
|
+
Vulnerability Insight:
|
21
|
+
Multiple flaws are caused by unspecified errors in the following
|
22
|
+
components:
|
23
|
+
- 2D
|
24
|
+
- AWT
|
25
|
+
- Sound
|
26
|
+
- I18n
|
27
|
+
- CORBA
|
28
|
+
- Serialization
|
29
|
+
|
30
|
+
Impact:
|
31
|
+
Successful exploitation allows remote attackers to affect confidentiality,
|
32
|
+
integrity, and availability via unknown vectors.
|
33
|
+
|
34
|
+
Impact Level: System/Application
|
35
|
+
|
36
|
+
Affected Software/OS:
|
37
|
+
Oracle Java SE JRE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33
|
38
|
+
and earlier, and 1.4.2_35 and earlier
|
39
|
+
|
40
|
+
Solution:
|
41
|
+
Upgrade to Oracle Java SE JRE versions 7 Update 3, 6 Update 31, 5.0 Update
|
42
|
+
34, 1.4.2_36 or later. For updates refer to
|
43
|
+
http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html
|
44
|
+
</description>
|
45
|
+
<original_threat>High</original_threat>
|
46
|
+
<notes/>
|
47
|
+
<overrides/>
|
48
|
+
</result>
|
@@ -0,0 +1,68 @@
|
|
1
|
+
<?xml version="1.0"?>
|
2
|
+
<result id="32249f6c-89f1-4a93-888f-29404b01374f">
|
3
|
+
<subnet>188.111.11.85</subnet>
|
4
|
+
<host>188.111.11.85</host>
|
5
|
+
<port>http (80/tcp)</port>
|
6
|
+
<nvt oid="1.3.6.1.4.1.25623.1.0.103122">
|
7
|
+
<name>Apache Web Server ETag Header Information Disclosure Weakness</name>
|
8
|
+
<family>Web application abuses</family>
|
9
|
+
<cvss_base>4.3</cvss_base>
|
10
|
+
<risk_factor>Medium</risk_factor>
|
11
|
+
<cve>CVE-2003-1418</cve>
|
12
|
+
<bid>6939</bid>
|
13
|
+
<tags>cvss_base_vector=AV:N/AC:M/Au:N/C:P/I:N/A:N|summary=A weakness has been discovered in Apache web servers that are
|
14
|
+
configured to use the FileETag directive. Due to the way in which
|
15
|
+
Apache generates ETag response headers, it may be possible for an
|
16
|
+
attacker to obtain sensitive information regarding server files.
|
17
|
+
Specifically, ETag header fields returned to a client contain the
|
18
|
+
file's inode number.
|
19
|
+
|
20
|
+
Exploitation of this issue may provide an attacker with information
|
21
|
+
that may be used to launch further attacks against a target network.
|
22
|
+
|
23
|
+
OpenBSD has released a patch that addresses this issue. Inode numbers
|
24
|
+
returned from the server are now encoded using a private hash to avoid
|
25
|
+
the release of sensitive information.|solution=OpenBSD has released a patch to address this issue.
|
26
|
+
|
27
|
+
Novell has released TID10090670 to advise users to apply the available
|
28
|
+
workaround of disabling the directive in the configuration file for
|
29
|
+
Apache releases on NetWare. Please see the attached Technical
|
30
|
+
Information Document for further details.</tags>
|
31
|
+
<cert>
|
32
|
+
<warning>database not available</warning>
|
33
|
+
</cert>
|
34
|
+
<xref>URL:https://www.securityfocus.com/bid/6939, URL:http://httpd.apache.org/docs/mod/core.html#fileetag, URL:http://www.openbsd.org/errata32.html, URL:http://support.novell.com/docs/Tids/Solutions/10090670.html</xref>
|
35
|
+
</nvt>
|
36
|
+
<threat>Medium</threat>
|
37
|
+
<description>
|
38
|
+
Summary:
|
39
|
+
A weakness has been discovered in Apache web servers that are
|
40
|
+
configured to use the FileETag directive. Due to the way in which
|
41
|
+
Apache generates ETag response headers, it may be possible for an
|
42
|
+
attacker to obtain sensitive information regarding server files.
|
43
|
+
Specifically, ETag header fields returned to a client contain the
|
44
|
+
file's inode number.
|
45
|
+
|
46
|
+
Exploitation of this issue may provide an attacker with information
|
47
|
+
that may be used to launch further attacks against a target network.
|
48
|
+
|
49
|
+
OpenBSD has released a patch that addresses this issue. Inode numbers
|
50
|
+
returned from the server are now encoded using a private hash to avoid
|
51
|
+
the release of sensitive information.
|
52
|
+
Solution:
|
53
|
+
OpenBSD has released a patch to address this issue.
|
54
|
+
|
55
|
+
Novell has released TID10090670 to advise users to apply the available
|
56
|
+
workaround of disabling the directive in the configuration file for
|
57
|
+
Apache releases on NetWare. Please see the attached Technical
|
58
|
+
Information Document for further details.
|
59
|
+
|
60
|
+
Information that was gathered:
|
61
|
+
Inode: 1050855
|
62
|
+
Size: 177
|
63
|
+
|
64
|
+
</description>
|
65
|
+
<original_threat>Medium</original_threat>
|
66
|
+
<notes/>
|
67
|
+
<overrides/>
|
68
|
+
</result>
|
@@ -0,0 +1,427 @@
|
|
1
|
+
<?xml version="1.0"?>
|
2
|
+
<report id="f3732b63-5257-452b-91a1-b69db4ae7261" format_id="a994b278-1f62-11e1-96ac-406186ea4fc5" extension="xml" type="scan" content_type="text/xml">
|
3
|
+
<owner>
|
4
|
+
<name/>
|
5
|
+
</owner>
|
6
|
+
<name>2014-09-20T03:55:33Z</name>
|
7
|
+
<comment/>
|
8
|
+
<creation_time>2014-09-20T03:55:33Z</creation_time>
|
9
|
+
<modification_time>2014-09-20T05:09:20Z</modification_time>
|
10
|
+
<writable>0</writable>
|
11
|
+
<in_use>0</in_use>
|
12
|
+
<report id="f3732b63-5257-452b-91a1-b69db4ae7261">
|
13
|
+
<report_format/>
|
14
|
+
<sort>
|
15
|
+
<field>severity<order>descending</order></field>
|
16
|
+
</sort>
|
17
|
+
<filters id="0">hmlg<term>sort-reverse=severity result_hosts_only=1 min_cvss_base= levels=hmlg autofp=0 notes=1 overrides=1 first=1 rows=50 delta_states=gn</term><phrase/><autofp>0</autofp><notes>1</notes><overrides>1</overrides><apply_overrides>1</apply_overrides><result_hosts_only>1</result_hosts_only><min_cvss_base/><filter>High</filter><filter>Medium</filter><filter>Low</filter><filter>Log</filter></filters>
|
18
|
+
<severity_class id="d4c74cda-89e1-11e3-9c29-406186ea4fc5">
|
19
|
+
<name>nist</name>
|
20
|
+
<full_name>NVD Vulnerability Severity Ratings</full_name>
|
21
|
+
<severity_range>
|
22
|
+
<name>None</name>
|
23
|
+
<min>0.0</min>
|
24
|
+
<max>0.0</max>
|
25
|
+
</severity_range>
|
26
|
+
<severity_range>
|
27
|
+
<name>Low</name>
|
28
|
+
<min>0.1</min>
|
29
|
+
<max>3.9</max>
|
30
|
+
</severity_range>
|
31
|
+
<severity_range>
|
32
|
+
<name>Medium</name>
|
33
|
+
<min>4.0</min>
|
34
|
+
<max>6.9</max>
|
35
|
+
</severity_range>
|
36
|
+
<severity_range>
|
37
|
+
<name>High</name>
|
38
|
+
<min>7.0</min>
|
39
|
+
<max>10.0</max>
|
40
|
+
</severity_range>
|
41
|
+
</severity_class>
|
42
|
+
<user_tags>
|
43
|
+
<count>0</count>
|
44
|
+
</user_tags>
|
45
|
+
<scan_run_status>Done</scan_run_status>
|
46
|
+
<hosts>
|
47
|
+
<count>1</count>
|
48
|
+
</hosts>
|
49
|
+
<closed_cves>
|
50
|
+
<count>0</count>
|
51
|
+
</closed_cves>
|
52
|
+
<vulns>
|
53
|
+
<count>30</count>
|
54
|
+
</vulns>
|
55
|
+
<os>
|
56
|
+
<count>1</count>
|
57
|
+
</os>
|
58
|
+
<apps>
|
59
|
+
<count>2</count>
|
60
|
+
</apps>
|
61
|
+
<ssl_certs>
|
62
|
+
<count>4</count>
|
63
|
+
</ssl_certs>
|
64
|
+
<task id="27ea49cb-96a2-4eff-b1b1-6f41bac3178d">
|
65
|
+
<name>10.10.10.10</name>
|
66
|
+
<comment/>
|
67
|
+
<target id="f8a7cd4b-10df-4ccd-928c-91f286d74463">
|
68
|
+
<trash>0</trash>
|
69
|
+
</target>
|
70
|
+
<progress>-1</progress>
|
71
|
+
</task>
|
72
|
+
<scan>
|
73
|
+
<task>
|
74
|
+
<slave id="">
|
75
|
+
<name/>
|
76
|
+
<host/>
|
77
|
+
<port>0</port>
|
78
|
+
</slave>
|
79
|
+
<preferences>
|
80
|
+
<preference>
|
81
|
+
<name>Network Source Interface</name>
|
82
|
+
<scanner_name>source_iface</scanner_name>
|
83
|
+
<value/>
|
84
|
+
</preference>
|
85
|
+
</preferences>
|
86
|
+
</task>
|
87
|
+
</scan>
|
88
|
+
<timestamp>2014-09-20T03:55:32Z</timestamp>
|
89
|
+
<scan_start>2014-09-20T03:55:33Z</scan_start>
|
90
|
+
<ports max="50" start="1">
|
91
|
+
<count>7</count>
|
92
|
+
<port>1443/tcp<host>10.10.10.10</host><severity>6.8</severity><threat>Medium</threat></port>
|
93
|
+
<port>8443/tcp<host>10.10.10.10</host><severity>6.4</severity><threat>Medium</threat></port>
|
94
|
+
<port>3390/tcp<host>10.10.10.10</host><severity>5.0</severity><threat>Medium</threat></port>
|
95
|
+
<port>443/tcp<host>10.10.10.10</host><severity>4.3</severity><threat>Medium</threat></port>
|
96
|
+
<port>general/tcp<host>10.10.10.10</host><severity>2.6</severity><threat>Low</threat></port>
|
97
|
+
<port>general/CPE-T<host>10.10.10.10</host><severity>0.0</severity><threat>Log</threat></port>
|
98
|
+
<port>541/tcp<host>10.10.10.10</host><severity>0.0</severity><threat>Log</threat></port>
|
99
|
+
<port>3391/tcp<host>10.10.10.10</host><severity>0.0</severity><threat>Log</threat></port>
|
100
|
+
<port>25/tcp<host>10.10.10.10</host><severity>0.0</severity><threat>Log</threat></port>
|
101
|
+
</ports>
|
102
|
+
<results max="50" start="1">
|
103
|
+
<result id="e68f58e5-1451-43ca-a279-395904bbe03f">
|
104
|
+
<user_tags>
|
105
|
+
<count>0</count>
|
106
|
+
</user_tags>
|
107
|
+
<host>10.10.10.10</host>
|
108
|
+
<port>1443/tcp</port>
|
109
|
+
<nvt oid="1.3.6.1.4.1.25623.1.0.105042">
|
110
|
+
<name>OpenSSL CCS Man in the Middle Security Bypass Vulnerability</name>
|
111
|
+
<family>General</family>
|
112
|
+
<cvss_base>6.8</cvss_base>
|
113
|
+
<cve>CVE-2014-0224</cve>
|
114
|
+
<bid>67899</bid>
|
115
|
+
<tags>cvss_base_vector=AV:N/AC:M/Au:N/C:P/I:P/A:P|impact=Successfully exploiting this issue may allow attackers to obtain
|
116
|
+
sensitive information by conducting a man-in-the-middle attack. This
|
117
|
+
may lead to other attacks.|vuldetect=Send two SSL ChangeCipherSpec request and check the response.|insight=OpenSSL does not properly restrict processing of ChangeCipherSpec
|
118
|
+
messages, which allows man-in-the-middle attackers to trigger use of a
|
119
|
+
zero-length master key in certain OpenSSL-to-OpenSSL communications, and
|
120
|
+
consequently hijack sessions or obtain sensitive information, via a crafted
|
121
|
+
TLS handshake, aka the 'CCS Injection' vulnerability.|solution=Updates are available.|summary=OpenSSL is prone to security-bypass vulnerability.|affected=OpenSSL before 0.9.8za,
|
122
|
+
1.0.0 before 1.0.0m and
|
123
|
+
1.0.1 before 1.0.1h</tags>
|
124
|
+
<cert>
|
125
|
+
<cert_ref id="DFN-CERT-2014-1209" type="DFN-CERT"/>
|
126
|
+
<cert_ref id="DFN-CERT-2014-0917" type="DFN-CERT"/>
|
127
|
+
<cert_ref id="DFN-CERT-2014-0789" type="DFN-CERT"/>
|
128
|
+
<cert_ref id="DFN-CERT-2014-0778" type="DFN-CERT"/>
|
129
|
+
<cert_ref id="DFN-CERT-2014-0768" type="DFN-CERT"/>
|
130
|
+
<cert_ref id="DFN-CERT-2014-0752" type="DFN-CERT"/>
|
131
|
+
<cert_ref id="DFN-CERT-2014-0747" type="DFN-CERT"/>
|
132
|
+
<cert_ref id="DFN-CERT-2014-0738" type="DFN-CERT"/>
|
133
|
+
<cert_ref id="DFN-CERT-2014-0715" type="DFN-CERT"/>
|
134
|
+
<cert_ref id="DFN-CERT-2014-0714" type="DFN-CERT"/>
|
135
|
+
<cert_ref id="DFN-CERT-2014-0709" type="DFN-CERT"/>
|
136
|
+
</cert>
|
137
|
+
<xref>URL:http://www.securityfocus.com/bid/67899, URL:http://openssl.org/</xref>
|
138
|
+
</nvt>
|
139
|
+
<scan_nvt_version>$Revision: 494 $</scan_nvt_version>
|
140
|
+
<threat>Medium</threat>
|
141
|
+
<severity>6.8</severity>
|
142
|
+
<description/>
|
143
|
+
<original_threat>Medium</original_threat>
|
144
|
+
<original_severity>6.8</original_severity>
|
145
|
+
<notes/>
|
146
|
+
<overrides/>
|
147
|
+
</result>
|
148
|
+
<result id="4e116de0-992f-43b8-bf7b-3305d7192302">
|
149
|
+
<user_tags>
|
150
|
+
<count>0</count>
|
151
|
+
</user_tags>
|
152
|
+
<detection>
|
153
|
+
<result id="16c22b77-123d-4e35-bb84-699552c80400">
|
154
|
+
<details>
|
155
|
+
<detail>
|
156
|
+
<name>product</name>
|
157
|
+
<value>cpe:/a:apache:tomcat:6.0.26</value>
|
158
|
+
</detail>
|
159
|
+
<detail>
|
160
|
+
<name>location</name>
|
161
|
+
<value>8443/tcp</value>
|
162
|
+
</detail>
|
163
|
+
<detail>
|
164
|
+
<name>source_oid</name>
|
165
|
+
<value>1.3.6.1.4.1.25623.1.0.800371</value>
|
166
|
+
</detail>
|
167
|
+
<detail>
|
168
|
+
<name>source_name</name>
|
169
|
+
<value>Apache Tomcat Version Detection</value>
|
170
|
+
</detail>
|
171
|
+
</details>
|
172
|
+
</result>
|
173
|
+
</detection>
|
174
|
+
<host>10.10.10.10</host>
|
175
|
+
<port>8443/tcp</port>
|
176
|
+
<nvt oid="1.3.6.1.4.1.25623.1.0.100712">
|
177
|
+
<name>Apache Tomcat 'Transfer-Encoding' Information Disclosure and Denial Of Service Vulnerabilities</name>
|
178
|
+
<family>Web Servers</family>
|
179
|
+
<cvss_base>6.4</cvss_base>
|
180
|
+
<cve>CVE-2010-2227</cve>
|
181
|
+
<bid>41544</bid>
|
182
|
+
<tags>cvss_base_vector=AV:N/AC:L/Au:N/C:P/I:N/A:P|solution=The vendor released updates. Please see the references for more
|
183
|
+
information.|summary=Apache Tomcat is prone to multiple remote vulnerabilities including
|
184
|
+
information-disclosure and denial-of-service issues.
|
185
|
+
|
186
|
+
Remote attackers can exploit these issues to cause denial-of-service
|
187
|
+
conditions or gain access to potentially sensitive information
|
188
|
+
|
189
|
+
information obtained may lead to further attacks.
|
190
|
+
|
191
|
+
The following versions are affected:
|
192
|
+
|
193
|
+
Tomcat 5.5.0 to 5.5.29 Tomcat 6.0.0 to 6.0.27 Tomcat 7.0.0
|
194
|
+
|
195
|
+
Tomcat 3.x, 4.x, and 5.0.x may also be affected.</tags>
|
196
|
+
<cert>
|
197
|
+
<cert_ref id="DFN-CERT-2012-1832" type="DFN-CERT"/>
|
198
|
+
<cert_ref id="DFN-CERT-2012-0828" type="DFN-CERT"/>
|
199
|
+
<cert_ref id="DFN-CERT-2011-0465" type="DFN-CERT"/>
|
200
|
+
<cert_ref id="DFN-CERT-2011-0185" type="DFN-CERT"/>
|
201
|
+
<cert_ref id="DFN-CERT-2010-1647" type="DFN-CERT"/>
|
202
|
+
<cert_ref id="DFN-CERT-2010-1607" type="DFN-CERT"/>
|
203
|
+
<cert_ref id="DFN-CERT-2010-1560" type="DFN-CERT"/>
|
204
|
+
<cert_ref id="DFN-CERT-2010-1472" type="DFN-CERT"/>
|
205
|
+
<cert_ref id="DFN-CERT-2010-1247" type="DFN-CERT"/>
|
206
|
+
<cert_ref id="DFN-CERT-2010-1192" type="DFN-CERT"/>
|
207
|
+
<cert_ref id="DFN-CERT-2010-1190" type="DFN-CERT"/>
|
208
|
+
<cert_ref id="DFN-CERT-2010-0986" type="DFN-CERT"/>
|
209
|
+
<cert_ref id="DFN-CERT-2010-0985" type="DFN-CERT"/>
|
210
|
+
<cert_ref id="DFN-CERT-2010-0983" type="DFN-CERT"/>
|
211
|
+
</cert>
|
212
|
+
<xref>URL:https://www.securityfocus.com/bid/41544, URL:http://tomcat.apache.org/security-5.html, URL:http://tomcat.apache.org/security-6.html, URL:http://tomcat.apache.org/security-7.html, URL:http://tomcat.apache.org/, URL:http://www.securityfocus.com/archive/1/512272</xref>
|
213
|
+
</nvt>
|
214
|
+
<scan_nvt_version>$Revision: 14 $</scan_nvt_version>
|
215
|
+
<threat>Medium</threat>
|
216
|
+
<severity>6.4</severity>
|
217
|
+
<description/>
|
218
|
+
<original_threat>Medium</original_threat>
|
219
|
+
<original_severity>6.4</original_severity>
|
220
|
+
<notes/>
|
221
|
+
<overrides/>
|
222
|
+
</result>
|
223
|
+
<result id="c7809bd8-e17d-4602-89c9-66a391638f20">
|
224
|
+
<user_tags>
|
225
|
+
<count>0</count>
|
226
|
+
</user_tags>
|
227
|
+
<host>10.10.10.10</host>
|
228
|
+
<port>3390/tcp</port>
|
229
|
+
<nvt oid="1.3.6.1.4.1.25623.1.0.103955">
|
230
|
+
<name>SSL Certification Expired</name>
|
231
|
+
<family>General</family>
|
232
|
+
<cvss_base>5.0</cvss_base>
|
233
|
+
<cve>NOCVE</cve>
|
234
|
+
<bid>NOBID</bid>
|
235
|
+
<tags>cvss_base_vector=AV:N/AC:L/Au:N/C:N/I:P/A:N|insight=This script checks expiry dates of certificates associated with
|
236
|
+
SSL-enabled services on the target and reports whether any have already
|
237
|
+
expired.|solution=Replace the SSL certificate by a new one.|summary=The remote server's SSL certificate has already expired.</tags>
|
238
|
+
<cert/>
|
239
|
+
<xref>NOXREF</xref>
|
240
|
+
</nvt>
|
241
|
+
<scan_nvt_version>$Revision: 626 $</scan_nvt_version>
|
242
|
+
<threat>Medium</threat>
|
243
|
+
<severity>5.0</severity>
|
244
|
+
<description>Expired Certificates:\
|
245
|
+
\
|
246
|
+
\
|
247
|
+
The SSL certificate on the remote service expired on 2014-03-22 09:52:56
|
248
|
+
Certificate details:
|
249
|
+
subject ...: CN=office.domain.com,OU=Client,O=Client,L=null,ST=MB,C=CA
|
250
|
+
issued by .: CN=office.domain.com,OU=Client,O=Client,L=null,ST=MB,C=CA
|
251
|
+
serial ....: 4F685378
|
252
|
+
valid from : 2012-03-20 09:52:56 UTC
|
253
|
+
valid until: 2014-03-22 09:52:56 UTC
|
254
|
+
fingerprint: 0C699AFA6640A42A199C7926F32CFBDA8FA0936C
|
255
|
+
</description>
|
256
|
+
<original_threat>Medium</original_threat>
|
257
|
+
<original_severity>5.0</original_severity>
|
258
|
+
<notes/>
|
259
|
+
<overrides/>
|
260
|
+
</result>
|
261
|
+
<result id="316bfba3-3fa4-46a7-83e4-ace6ac6f109b">
|
262
|
+
<user_tags>
|
263
|
+
<count>0</count>
|
264
|
+
</user_tags>
|
265
|
+
<host>10.10.10.10</host>
|
266
|
+
<port>443/tcp</port>
|
267
|
+
<nvt oid="1.3.6.1.4.1.25623.1.0.103440">
|
268
|
+
<name>Check for SSL Weak Ciphers</name>
|
269
|
+
<family>General</family>
|
270
|
+
<cvss_base>4.3</cvss_base>
|
271
|
+
<cve>NOCVE</cve>
|
272
|
+
<bid>NOBID</bid>
|
273
|
+
<tags>cvss_base_vector=AV:N/AC:M/Au:N/C:P/I:N/A:N|summary=This routine search for weak SSL ciphers offered by a service.|solution=The configuration of this services should be changed so
|
274
|
+
that it does not support the listed weak ciphers anymore.|insight=These rules are applied for the evaluation of the cryptographic strength:
|
275
|
+
|
276
|
+
- Any SSL/TLS using no cipher is considered weak.
|
277
|
+
|
278
|
+
- All SSLv2 ciphers are considered weak due to a design flaw within the SSLv2 protocol.
|
279
|
+
|
280
|
+
- RC4 is considered to be weak.
|
281
|
+
|
282
|
+
- Ciphers using 64 bit or less are considered to be vulnerable to brute force methods
|
283
|
+
and therefore considered as weak.
|
284
|
+
|
285
|
+
- 1024 bit RSA authentication is considered to be insecure and therefore as weak.
|
286
|
+
|
287
|
+
- CBC ciphers in TLS < 1.2 are considered to be vulnerable to the BEAST or Lucky 13 attacks
|
288
|
+
|
289
|
+
- Any cipher considered to be secure for only the next 10 years is considered as medium
|
290
|
+
|
291
|
+
- Any other cipher is considered as strong</tags>
|
292
|
+
<cert/>
|
293
|
+
<xref>NOXREF</xref>
|
294
|
+
</nvt>
|
295
|
+
<scan_nvt_version>$Revision: 342 $</scan_nvt_version>
|
296
|
+
<threat>Medium</threat>
|
297
|
+
<severity>4.3</severity>
|
298
|
+
<description>
|
299
|
+
|
300
|
+
Weak ciphers offered by this service:
|
301
|
+
SSL3_RSA_RC4_128_MD5
|
302
|
+
SSL3_RSA_RC4_128_SHA
|
303
|
+
TLS1_RSA_RC4_128_MD5
|
304
|
+
TLS1_RSA_RC4_128_SHA
|
305
|
+
</description>
|
306
|
+
<original_threat>Medium</original_threat>
|
307
|
+
<original_severity>4.3</original_severity>
|
308
|
+
<notes/>
|
309
|
+
<overrides/>
|
310
|
+
</result>
|
311
|
+
<result id="dda07a69-4a35-4ebf-a84b-1d98f179f8a9">
|
312
|
+
<user_tags>
|
313
|
+
<count>0</count>
|
314
|
+
</user_tags>
|
315
|
+
<host>10.10.10.10</host>
|
316
|
+
<port>1443/tcp</port>
|
317
|
+
<nvt oid="1.3.6.1.4.1.25623.1.0.103440">
|
318
|
+
<name>Check for SSL Weak Ciphers</name>
|
319
|
+
<family>General</family>
|
320
|
+
<cvss_base>4.3</cvss_base>
|
321
|
+
<cve>NOCVE</cve>
|
322
|
+
<bid>NOBID</bid>
|
323
|
+
<tags>cvss_base_vector=AV:N/AC:M/Au:N/C:P/I:N/A:N|summary=This routine search for weak SSL ciphers offered by a service.|solution=The configuration of this services should be changed so
|
324
|
+
that it does not support the listed weak ciphers anymore.|insight=These rules are applied for the evaluation of the cryptographic strength:
|
325
|
+
|
326
|
+
- Any SSL/TLS using no cipher is considered weak.
|
327
|
+
|
328
|
+
- All SSLv2 ciphers are considered weak due to a design flaw within the SSLv2 protocol.
|
329
|
+
|
330
|
+
- RC4 is considered to be weak.
|
331
|
+
|
332
|
+
- Ciphers using 64 bit or less are considered to be vulnerable to brute force methods
|
333
|
+
and therefore considered as weak.
|
334
|
+
|
335
|
+
- 1024 bit RSA authentication is considered to be insecure and therefore as weak.
|
336
|
+
|
337
|
+
- CBC ciphers in TLS < 1.2 are considered to be vulnerable to the BEAST or Lucky 13 attacks
|
338
|
+
|
339
|
+
- Any cipher considered to be secure for only the next 10 years is considered as medium
|
340
|
+
|
341
|
+
- Any other cipher is considered as strong</tags>
|
342
|
+
<cert/>
|
343
|
+
<xref>NOXREF</xref>
|
344
|
+
</nvt>
|
345
|
+
<scan_nvt_version>$Revision: 342 $</scan_nvt_version>
|
346
|
+
<threat>Medium</threat>
|
347
|
+
<severity>4.3</severity>
|
348
|
+
<description>
|
349
|
+
|
350
|
+
Weak ciphers offered by this service:
|
351
|
+
SSL3_RSA_RC4_128_MD5
|
352
|
+
SSL3_RSA_RC4_128_SHA
|
353
|
+
SSL3_RSA_DES_64_CBC_SHA
|
354
|
+
SSL3_EDH_RSA_DES_64_CBC_SHA
|
355
|
+
SSL3_RSA_WITH_SEED_SHA
|
356
|
+
TLS1_RSA_RC4_128_MD5
|
357
|
+
TLS1_RSA_RC4_128_SHA
|
358
|
+
TLS1_RSA_DES_64_CBC_SHA
|
359
|
+
TLS1_EDH_RSA_DES_64_CBC_SHA
|
360
|
+
</description>
|
361
|
+
<original_threat>Medium</original_threat>
|
362
|
+
<original_severity>4.3</original_severity>
|
363
|
+
<notes/>
|
364
|
+
<overrides/>
|
365
|
+
</result>
|
366
|
+
<result id="3e4674f3-a6a6-4d9c-b3e9-ff54222cecb6">
|
367
|
+
<user_tags>
|
368
|
+
<count>0</count>
|
369
|
+
</user_tags>
|
370
|
+
<detection>
|
371
|
+
<result id="16c22b77-123d-4e35-bb84-699552c80400">
|
372
|
+
<details>
|
373
|
+
<detail>
|
374
|
+
<name>product</name>
|
375
|
+
<value>cpe:/a:apache:tomcat:6.0.26</value>
|
376
|
+
</detail>
|
377
|
+
<detail>
|
378
|
+
<name>location</name>
|
379
|
+
<value>8443/tcp</value>
|
380
|
+
</detail>
|
381
|
+
<detail>
|
382
|
+
<name>source_oid</name>
|
383
|
+
<value>1.3.6.1.4.1.25623.1.0.800371</value>
|
384
|
+
</detail>
|
385
|
+
<detail>
|
386
|
+
<name>source_name</name>
|
387
|
+
<value>Apache Tomcat Version Detection</value>
|
388
|
+
</detail>
|
389
|
+
</details>
|
390
|
+
</result>
|
391
|
+
</detection>
|
392
|
+
<host>10.10.10.10</host>
|
393
|
+
<port>8443/tcp</port>
|
394
|
+
<nvt oid="1.3.6.1.4.1.25623.1.0.103032">
|
395
|
+
<name>Apache Tomcat 'sort' and 'orderBy' Parameters Cross Site Scripting Vulnerabilities</name>
|
396
|
+
<family>Web Servers</family>
|
397
|
+
<cvss_base>4.3</cvss_base>
|
398
|
+
<cve>CVE-2010-4172</cve>
|
399
|
+
<bid>45015</bid>
|
400
|
+
<tags>cvss_base_vector=AV:N/AC:M/Au:N/C:N/I:P/A:N|solution=Updates are available
|
401
|
+
please see the references for more information.|summary=Apache Tomcat is prone to multiple cross-site scripting
|
402
|
+
vulnerabilities because it fails to properly sanitize user-
|
403
|
+
supplied input.
|
404
|
+
|
405
|
+
An attacker may leverage these issues to execute arbitrary script code
|
406
|
+
in the browser of an unsuspecting user in the context of the affected
|
407
|
+
site. This may let the attacker steal cookie-based authentication
|
408
|
+
credentials and launch other attacks.</tags>
|
409
|
+
<cert>
|
410
|
+
<cert_ref id="DFN-CERT-2012-1832" type="DFN-CERT"/>
|
411
|
+
<cert_ref id="DFN-CERT-2011-0793" type="DFN-CERT"/>
|
412
|
+
<cert_ref id="DFN-CERT-2011-0181" type="DFN-CERT"/>
|
413
|
+
</cert>
|
414
|
+
<xref>URL:https://www.securityfocus.com/bid/45015, URL:http://tomcat.apache.org/security-6.html, URL:http://tomcat.apache.org/security-7.html, URL:http://tomcat.apache.org/security-6.html, URL:http://tomcat.apache.org/security-7.html, URL:http://jakarta.apache.org/tomcat/, URL:http://www.securityfocus.com/archive/1/514866</xref>
|
415
|
+
</nvt>
|
416
|
+
<scan_nvt_version>$Revision: 13 $</scan_nvt_version>
|
417
|
+
<threat>Medium</threat>
|
418
|
+
<severity>4.3</severity>
|
419
|
+
<description/>
|
420
|
+
<original_threat>Medium</original_threat>
|
421
|
+
<original_severity>4.3</original_severity>
|
422
|
+
<notes/>
|
423
|
+
<overrides/>
|
424
|
+
</result>
|
425
|
+
</results>
|
426
|
+
</report>
|
427
|
+
</report>
|