dradis-openvas 3.6.0

Sign up to get free protection for your applications and to get access to all the features.
@@ -0,0 +1,26 @@
1
+ class OpenVASTasks < Thor
2
+ include Rails.application.config.dradis.thor_helper_module
3
+
4
+ namespace "dradis:plugins:openvas"
5
+
6
+ desc "upload FILE", "upload OpenVAS XML results"
7
+ def upload(file_path)
8
+ require 'config/environment'
9
+
10
+ logger = Logger.new(STDOUT)
11
+ logger.level = Logger::DEBUG
12
+
13
+ unless File.exists?(file_path)
14
+ $stderr.puts "** the file [#{file_path}] does not exist"
15
+ exit -1
16
+ end
17
+
18
+ detect_and_set_project_scope
19
+
20
+ importer = Dradis::Plugins::OpenVAS::Importer.new(logger: logger)
21
+ importer.import(file: file_path)
22
+
23
+ logger.close
24
+ end
25
+
26
+ end
@@ -0,0 +1,48 @@
1
+ <?xml version="1.0"?>
2
+ <result id="e2ccf551-ea4e-4186-9b24-76287d6244f3">
3
+ <subnet>172.31.253.9</subnet>
4
+ <host>172.31.253.9</host>
5
+ <port>general/tcp</port>
6
+ <nvt oid="1.3.6.1.4.1.25623.1.0.802610">
7
+ <name>Oracle Java SE JRE Multiple Vulnerabilities - February 2012 (Windows - 01)</name>
8
+ <cvss_base>10.0</cvss_base>
9
+ <risk_factor>Critical</risk_factor>
10
+ <cve>CVE-2011-3563, CVE-2012-0499, CVE-2012-0502, CVE-2012-0503, CVE-2012-0505, CVE-2012-0506</cve>
11
+ <bid>52011, 52012, 52014, 52016, 52017, 52018</bid>
12
+ <xref>URL:http://secunia.com/advisories/48009, URL:http://www.pre-cert.de/advisories/PRE-SA-2012-01.txt, URL:http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html, URL:http://www.oracle.com/technetwork/java/javase/documentation/overview-142120.html, URL:http://www.oracle.com/technetwork/java/javase/documentation/overview-137139.html</xref>
13
+ </nvt>
14
+ <threat>High</threat>
15
+ <description>
16
+ Summary:
17
+ This host is installed with Oracle Java SE JRE and is prone to
18
+ multiple vulnerabilities.
19
+
20
+ Vulnerability Insight:
21
+ Multiple flaws are caused by unspecified errors in the following
22
+ components:
23
+ - 2D
24
+ - AWT
25
+ - Sound
26
+ - I18n
27
+ - CORBA
28
+ - Serialization
29
+
30
+ Impact:
31
+ Successful exploitation allows remote attackers to affect confidentiality,
32
+ integrity, and availability via unknown vectors.
33
+
34
+ Impact Level: System/Application
35
+
36
+ Affected Software/OS:
37
+ Oracle Java SE JRE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33
38
+ and earlier, and 1.4.2_35 and earlier
39
+
40
+ Solution:
41
+ Upgrade to Oracle Java SE JRE versions 7 Update 3, 6 Update 31, 5.0 Update
42
+ 34, 1.4.2_36 or later. For updates refer to
43
+ http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html
44
+ </description>
45
+ <original_threat>High</original_threat>
46
+ <notes/>
47
+ <overrides/>
48
+ </result>
@@ -0,0 +1,68 @@
1
+ <?xml version="1.0"?>
2
+ <result id="32249f6c-89f1-4a93-888f-29404b01374f">
3
+ <subnet>188.111.11.85</subnet>
4
+ <host>188.111.11.85</host>
5
+ <port>http (80/tcp)</port>
6
+ <nvt oid="1.3.6.1.4.1.25623.1.0.103122">
7
+ <name>Apache Web Server ETag Header Information Disclosure Weakness</name>
8
+ <family>Web application abuses</family>
9
+ <cvss_base>4.3</cvss_base>
10
+ <risk_factor>Medium</risk_factor>
11
+ <cve>CVE-2003-1418</cve>
12
+ <bid>6939</bid>
13
+ <tags>cvss_base_vector=AV:N/AC:M/Au:N/C:P/I:N/A:N|summary=A weakness has been discovered in Apache web servers that are
14
+ configured to use the FileETag directive. Due to the way in which
15
+ Apache generates ETag response headers, it may be possible for an
16
+ attacker to obtain sensitive information regarding server files.
17
+ Specifically, ETag header fields returned to a client contain the
18
+ file's inode number.
19
+
20
+ Exploitation of this issue may provide an attacker with information
21
+ that may be used to launch further attacks against a target network.
22
+
23
+ OpenBSD has released a patch that addresses this issue. Inode numbers
24
+ returned from the server are now encoded using a private hash to avoid
25
+ the release of sensitive information.|solution=OpenBSD has released a patch to address this issue.
26
+
27
+ Novell has released TID10090670 to advise users to apply the available
28
+ workaround of disabling the directive in the configuration file for
29
+ Apache releases on NetWare. Please see the attached Technical
30
+ Information Document for further details.</tags>
31
+ <cert>
32
+ <warning>database not available</warning>
33
+ </cert>
34
+ <xref>URL:https://www.securityfocus.com/bid/6939, URL:http://httpd.apache.org/docs/mod/core.html#fileetag, URL:http://www.openbsd.org/errata32.html, URL:http://support.novell.com/docs/Tids/Solutions/10090670.html</xref>
35
+ </nvt>
36
+ <threat>Medium</threat>
37
+ <description>
38
+ Summary:
39
+ A weakness has been discovered in Apache web servers that are
40
+ configured to use the FileETag directive. Due to the way in which
41
+ Apache generates ETag response headers, it may be possible for an
42
+ attacker to obtain sensitive information regarding server files.
43
+ Specifically, ETag header fields returned to a client contain the
44
+ file's inode number.
45
+
46
+ Exploitation of this issue may provide an attacker with information
47
+ that may be used to launch further attacks against a target network.
48
+
49
+ OpenBSD has released a patch that addresses this issue. Inode numbers
50
+ returned from the server are now encoded using a private hash to avoid
51
+ the release of sensitive information.
52
+ Solution:
53
+ OpenBSD has released a patch to address this issue.
54
+
55
+ Novell has released TID10090670 to advise users to apply the available
56
+ workaround of disabling the directive in the configuration file for
57
+ Apache releases on NetWare. Please see the attached Technical
58
+ Information Document for further details.
59
+
60
+ Information that was gathered:
61
+ Inode: 1050855
62
+ Size: 177
63
+
64
+ </description>
65
+ <original_threat>Medium</original_threat>
66
+ <notes/>
67
+ <overrides/>
68
+ </result>
@@ -0,0 +1,427 @@
1
+ <?xml version="1.0"?>
2
+ <report id="f3732b63-5257-452b-91a1-b69db4ae7261" format_id="a994b278-1f62-11e1-96ac-406186ea4fc5" extension="xml" type="scan" content_type="text/xml">
3
+ <owner>
4
+ <name/>
5
+ </owner>
6
+ <name>2014-09-20T03:55:33Z</name>
7
+ <comment/>
8
+ <creation_time>2014-09-20T03:55:33Z</creation_time>
9
+ <modification_time>2014-09-20T05:09:20Z</modification_time>
10
+ <writable>0</writable>
11
+ <in_use>0</in_use>
12
+ <report id="f3732b63-5257-452b-91a1-b69db4ae7261">
13
+ <report_format/>
14
+ <sort>
15
+ <field>severity<order>descending</order></field>
16
+ </sort>
17
+ <filters id="0">hmlg<term>sort-reverse=severity result_hosts_only=1 min_cvss_base= levels=hmlg autofp=0 notes=1 overrides=1 first=1 rows=50 delta_states=gn</term><phrase/><autofp>0</autofp><notes>1</notes><overrides>1</overrides><apply_overrides>1</apply_overrides><result_hosts_only>1</result_hosts_only><min_cvss_base/><filter>High</filter><filter>Medium</filter><filter>Low</filter><filter>Log</filter></filters>
18
+ <severity_class id="d4c74cda-89e1-11e3-9c29-406186ea4fc5">
19
+ <name>nist</name>
20
+ <full_name>NVD Vulnerability Severity Ratings</full_name>
21
+ <severity_range>
22
+ <name>None</name>
23
+ <min>0.0</min>
24
+ <max>0.0</max>
25
+ </severity_range>
26
+ <severity_range>
27
+ <name>Low</name>
28
+ <min>0.1</min>
29
+ <max>3.9</max>
30
+ </severity_range>
31
+ <severity_range>
32
+ <name>Medium</name>
33
+ <min>4.0</min>
34
+ <max>6.9</max>
35
+ </severity_range>
36
+ <severity_range>
37
+ <name>High</name>
38
+ <min>7.0</min>
39
+ <max>10.0</max>
40
+ </severity_range>
41
+ </severity_class>
42
+ <user_tags>
43
+ <count>0</count>
44
+ </user_tags>
45
+ <scan_run_status>Done</scan_run_status>
46
+ <hosts>
47
+ <count>1</count>
48
+ </hosts>
49
+ <closed_cves>
50
+ <count>0</count>
51
+ </closed_cves>
52
+ <vulns>
53
+ <count>30</count>
54
+ </vulns>
55
+ <os>
56
+ <count>1</count>
57
+ </os>
58
+ <apps>
59
+ <count>2</count>
60
+ </apps>
61
+ <ssl_certs>
62
+ <count>4</count>
63
+ </ssl_certs>
64
+ <task id="27ea49cb-96a2-4eff-b1b1-6f41bac3178d">
65
+ <name>10.10.10.10</name>
66
+ <comment/>
67
+ <target id="f8a7cd4b-10df-4ccd-928c-91f286d74463">
68
+ <trash>0</trash>
69
+ </target>
70
+ <progress>-1</progress>
71
+ </task>
72
+ <scan>
73
+ <task>
74
+ <slave id="">
75
+ <name/>
76
+ <host/>
77
+ <port>0</port>
78
+ </slave>
79
+ <preferences>
80
+ <preference>
81
+ <name>Network Source Interface</name>
82
+ <scanner_name>source_iface</scanner_name>
83
+ <value/>
84
+ </preference>
85
+ </preferences>
86
+ </task>
87
+ </scan>
88
+ <timestamp>2014-09-20T03:55:32Z</timestamp>
89
+ <scan_start>2014-09-20T03:55:33Z</scan_start>
90
+ <ports max="50" start="1">
91
+ <count>7</count>
92
+ <port>1443/tcp<host>10.10.10.10</host><severity>6.8</severity><threat>Medium</threat></port>
93
+ <port>8443/tcp<host>10.10.10.10</host><severity>6.4</severity><threat>Medium</threat></port>
94
+ <port>3390/tcp<host>10.10.10.10</host><severity>5.0</severity><threat>Medium</threat></port>
95
+ <port>443/tcp<host>10.10.10.10</host><severity>4.3</severity><threat>Medium</threat></port>
96
+ <port>general/tcp<host>10.10.10.10</host><severity>2.6</severity><threat>Low</threat></port>
97
+ <port>general/CPE-T<host>10.10.10.10</host><severity>0.0</severity><threat>Log</threat></port>
98
+ <port>541/tcp<host>10.10.10.10</host><severity>0.0</severity><threat>Log</threat></port>
99
+ <port>3391/tcp<host>10.10.10.10</host><severity>0.0</severity><threat>Log</threat></port>
100
+ <port>25/tcp<host>10.10.10.10</host><severity>0.0</severity><threat>Log</threat></port>
101
+ </ports>
102
+ <results max="50" start="1">
103
+ <result id="e68f58e5-1451-43ca-a279-395904bbe03f">
104
+ <user_tags>
105
+ <count>0</count>
106
+ </user_tags>
107
+ <host>10.10.10.10</host>
108
+ <port>1443/tcp</port>
109
+ <nvt oid="1.3.6.1.4.1.25623.1.0.105042">
110
+ <name>OpenSSL CCS Man in the Middle Security Bypass Vulnerability</name>
111
+ <family>General</family>
112
+ <cvss_base>6.8</cvss_base>
113
+ <cve>CVE-2014-0224</cve>
114
+ <bid>67899</bid>
115
+ <tags>cvss_base_vector=AV:N/AC:M/Au:N/C:P/I:P/A:P|impact=Successfully exploiting this issue may allow attackers to obtain
116
+ sensitive information by conducting a man-in-the-middle attack. This
117
+ may lead to other attacks.|vuldetect=Send two SSL ChangeCipherSpec request and check the response.|insight=OpenSSL does not properly restrict processing of ChangeCipherSpec
118
+ messages, which allows man-in-the-middle attackers to trigger use of a
119
+ zero-length master key in certain OpenSSL-to-OpenSSL communications, and
120
+ consequently hijack sessions or obtain sensitive information, via a crafted
121
+ TLS handshake, aka the 'CCS Injection' vulnerability.|solution=Updates are available.|summary=OpenSSL is prone to security-bypass vulnerability.|affected=OpenSSL before 0.9.8za,
122
+ 1.0.0 before 1.0.0m and
123
+ 1.0.1 before 1.0.1h</tags>
124
+ <cert>
125
+ <cert_ref id="DFN-CERT-2014-1209" type="DFN-CERT"/>
126
+ <cert_ref id="DFN-CERT-2014-0917" type="DFN-CERT"/>
127
+ <cert_ref id="DFN-CERT-2014-0789" type="DFN-CERT"/>
128
+ <cert_ref id="DFN-CERT-2014-0778" type="DFN-CERT"/>
129
+ <cert_ref id="DFN-CERT-2014-0768" type="DFN-CERT"/>
130
+ <cert_ref id="DFN-CERT-2014-0752" type="DFN-CERT"/>
131
+ <cert_ref id="DFN-CERT-2014-0747" type="DFN-CERT"/>
132
+ <cert_ref id="DFN-CERT-2014-0738" type="DFN-CERT"/>
133
+ <cert_ref id="DFN-CERT-2014-0715" type="DFN-CERT"/>
134
+ <cert_ref id="DFN-CERT-2014-0714" type="DFN-CERT"/>
135
+ <cert_ref id="DFN-CERT-2014-0709" type="DFN-CERT"/>
136
+ </cert>
137
+ <xref>URL:http://www.securityfocus.com/bid/67899, URL:http://openssl.org/</xref>
138
+ </nvt>
139
+ <scan_nvt_version>$Revision: 494 $</scan_nvt_version>
140
+ <threat>Medium</threat>
141
+ <severity>6.8</severity>
142
+ <description/>
143
+ <original_threat>Medium</original_threat>
144
+ <original_severity>6.8</original_severity>
145
+ <notes/>
146
+ <overrides/>
147
+ </result>
148
+ <result id="4e116de0-992f-43b8-bf7b-3305d7192302">
149
+ <user_tags>
150
+ <count>0</count>
151
+ </user_tags>
152
+ <detection>
153
+ <result id="16c22b77-123d-4e35-bb84-699552c80400">
154
+ <details>
155
+ <detail>
156
+ <name>product</name>
157
+ <value>cpe:/a:apache:tomcat:6.0.26</value>
158
+ </detail>
159
+ <detail>
160
+ <name>location</name>
161
+ <value>8443/tcp</value>
162
+ </detail>
163
+ <detail>
164
+ <name>source_oid</name>
165
+ <value>1.3.6.1.4.1.25623.1.0.800371</value>
166
+ </detail>
167
+ <detail>
168
+ <name>source_name</name>
169
+ <value>Apache Tomcat Version Detection</value>
170
+ </detail>
171
+ </details>
172
+ </result>
173
+ </detection>
174
+ <host>10.10.10.10</host>
175
+ <port>8443/tcp</port>
176
+ <nvt oid="1.3.6.1.4.1.25623.1.0.100712">
177
+ <name>Apache Tomcat 'Transfer-Encoding' Information Disclosure and Denial Of Service Vulnerabilities</name>
178
+ <family>Web Servers</family>
179
+ <cvss_base>6.4</cvss_base>
180
+ <cve>CVE-2010-2227</cve>
181
+ <bid>41544</bid>
182
+ <tags>cvss_base_vector=AV:N/AC:L/Au:N/C:P/I:N/A:P|solution=The vendor released updates. Please see the references for more
183
+ information.|summary=Apache Tomcat is prone to multiple remote vulnerabilities including
184
+ information-disclosure and denial-of-service issues.
185
+
186
+ Remote attackers can exploit these issues to cause denial-of-service
187
+ conditions or gain access to potentially sensitive information
188
+
189
+ information obtained may lead to further attacks.
190
+
191
+ The following versions are affected:
192
+
193
+ Tomcat 5.5.0 to 5.5.29 Tomcat 6.0.0 to 6.0.27 Tomcat 7.0.0
194
+
195
+ Tomcat 3.x, 4.x, and 5.0.x may also be affected.</tags>
196
+ <cert>
197
+ <cert_ref id="DFN-CERT-2012-1832" type="DFN-CERT"/>
198
+ <cert_ref id="DFN-CERT-2012-0828" type="DFN-CERT"/>
199
+ <cert_ref id="DFN-CERT-2011-0465" type="DFN-CERT"/>
200
+ <cert_ref id="DFN-CERT-2011-0185" type="DFN-CERT"/>
201
+ <cert_ref id="DFN-CERT-2010-1647" type="DFN-CERT"/>
202
+ <cert_ref id="DFN-CERT-2010-1607" type="DFN-CERT"/>
203
+ <cert_ref id="DFN-CERT-2010-1560" type="DFN-CERT"/>
204
+ <cert_ref id="DFN-CERT-2010-1472" type="DFN-CERT"/>
205
+ <cert_ref id="DFN-CERT-2010-1247" type="DFN-CERT"/>
206
+ <cert_ref id="DFN-CERT-2010-1192" type="DFN-CERT"/>
207
+ <cert_ref id="DFN-CERT-2010-1190" type="DFN-CERT"/>
208
+ <cert_ref id="DFN-CERT-2010-0986" type="DFN-CERT"/>
209
+ <cert_ref id="DFN-CERT-2010-0985" type="DFN-CERT"/>
210
+ <cert_ref id="DFN-CERT-2010-0983" type="DFN-CERT"/>
211
+ </cert>
212
+ <xref>URL:https://www.securityfocus.com/bid/41544, URL:http://tomcat.apache.org/security-5.html, URL:http://tomcat.apache.org/security-6.html, URL:http://tomcat.apache.org/security-7.html, URL:http://tomcat.apache.org/, URL:http://www.securityfocus.com/archive/1/512272</xref>
213
+ </nvt>
214
+ <scan_nvt_version>$Revision: 14 $</scan_nvt_version>
215
+ <threat>Medium</threat>
216
+ <severity>6.4</severity>
217
+ <description/>
218
+ <original_threat>Medium</original_threat>
219
+ <original_severity>6.4</original_severity>
220
+ <notes/>
221
+ <overrides/>
222
+ </result>
223
+ <result id="c7809bd8-e17d-4602-89c9-66a391638f20">
224
+ <user_tags>
225
+ <count>0</count>
226
+ </user_tags>
227
+ <host>10.10.10.10</host>
228
+ <port>3390/tcp</port>
229
+ <nvt oid="1.3.6.1.4.1.25623.1.0.103955">
230
+ <name>SSL Certification Expired</name>
231
+ <family>General</family>
232
+ <cvss_base>5.0</cvss_base>
233
+ <cve>NOCVE</cve>
234
+ <bid>NOBID</bid>
235
+ <tags>cvss_base_vector=AV:N/AC:L/Au:N/C:N/I:P/A:N|insight=This script checks expiry dates of certificates associated with
236
+ SSL-enabled services on the target and reports whether any have already
237
+ expired.|solution=Replace the SSL certificate by a new one.|summary=The remote server's SSL certificate has already expired.</tags>
238
+ <cert/>
239
+ <xref>NOXREF</xref>
240
+ </nvt>
241
+ <scan_nvt_version>$Revision: 626 $</scan_nvt_version>
242
+ <threat>Medium</threat>
243
+ <severity>5.0</severity>
244
+ <description>Expired Certificates:\
245
+ \
246
+ \
247
+ The SSL certificate on the remote service expired on 2014-03-22 09:52:56
248
+ Certificate details:
249
+ subject ...: CN=office.domain.com,OU=Client,O=Client,L=null,ST=MB,C=CA
250
+ issued by .: CN=office.domain.com,OU=Client,O=Client,L=null,ST=MB,C=CA
251
+ serial ....: 4F685378
252
+ valid from : 2012-03-20 09:52:56 UTC
253
+ valid until: 2014-03-22 09:52:56 UTC
254
+ fingerprint: 0C699AFA6640A42A199C7926F32CFBDA8FA0936C
255
+ </description>
256
+ <original_threat>Medium</original_threat>
257
+ <original_severity>5.0</original_severity>
258
+ <notes/>
259
+ <overrides/>
260
+ </result>
261
+ <result id="316bfba3-3fa4-46a7-83e4-ace6ac6f109b">
262
+ <user_tags>
263
+ <count>0</count>
264
+ </user_tags>
265
+ <host>10.10.10.10</host>
266
+ <port>443/tcp</port>
267
+ <nvt oid="1.3.6.1.4.1.25623.1.0.103440">
268
+ <name>Check for SSL Weak Ciphers</name>
269
+ <family>General</family>
270
+ <cvss_base>4.3</cvss_base>
271
+ <cve>NOCVE</cve>
272
+ <bid>NOBID</bid>
273
+ <tags>cvss_base_vector=AV:N/AC:M/Au:N/C:P/I:N/A:N|summary=This routine search for weak SSL ciphers offered by a service.|solution=The configuration of this services should be changed so
274
+ that it does not support the listed weak ciphers anymore.|insight=These rules are applied for the evaluation of the cryptographic strength:
275
+
276
+ - Any SSL/TLS using no cipher is considered weak.
277
+
278
+ - All SSLv2 ciphers are considered weak due to a design flaw within the SSLv2 protocol.
279
+
280
+ - RC4 is considered to be weak.
281
+
282
+ - Ciphers using 64 bit or less are considered to be vulnerable to brute force methods
283
+ and therefore considered as weak.
284
+
285
+ - 1024 bit RSA authentication is considered to be insecure and therefore as weak.
286
+
287
+ - CBC ciphers in TLS &lt; 1.2 are considered to be vulnerable to the BEAST or Lucky 13 attacks
288
+
289
+ - Any cipher considered to be secure for only the next 10 years is considered as medium
290
+
291
+ - Any other cipher is considered as strong</tags>
292
+ <cert/>
293
+ <xref>NOXREF</xref>
294
+ </nvt>
295
+ <scan_nvt_version>$Revision: 342 $</scan_nvt_version>
296
+ <threat>Medium</threat>
297
+ <severity>4.3</severity>
298
+ <description>
299
+
300
+ Weak ciphers offered by this service:
301
+ SSL3_RSA_RC4_128_MD5
302
+ SSL3_RSA_RC4_128_SHA
303
+ TLS1_RSA_RC4_128_MD5
304
+ TLS1_RSA_RC4_128_SHA
305
+ </description>
306
+ <original_threat>Medium</original_threat>
307
+ <original_severity>4.3</original_severity>
308
+ <notes/>
309
+ <overrides/>
310
+ </result>
311
+ <result id="dda07a69-4a35-4ebf-a84b-1d98f179f8a9">
312
+ <user_tags>
313
+ <count>0</count>
314
+ </user_tags>
315
+ <host>10.10.10.10</host>
316
+ <port>1443/tcp</port>
317
+ <nvt oid="1.3.6.1.4.1.25623.1.0.103440">
318
+ <name>Check for SSL Weak Ciphers</name>
319
+ <family>General</family>
320
+ <cvss_base>4.3</cvss_base>
321
+ <cve>NOCVE</cve>
322
+ <bid>NOBID</bid>
323
+ <tags>cvss_base_vector=AV:N/AC:M/Au:N/C:P/I:N/A:N|summary=This routine search for weak SSL ciphers offered by a service.|solution=The configuration of this services should be changed so
324
+ that it does not support the listed weak ciphers anymore.|insight=These rules are applied for the evaluation of the cryptographic strength:
325
+
326
+ - Any SSL/TLS using no cipher is considered weak.
327
+
328
+ - All SSLv2 ciphers are considered weak due to a design flaw within the SSLv2 protocol.
329
+
330
+ - RC4 is considered to be weak.
331
+
332
+ - Ciphers using 64 bit or less are considered to be vulnerable to brute force methods
333
+ and therefore considered as weak.
334
+
335
+ - 1024 bit RSA authentication is considered to be insecure and therefore as weak.
336
+
337
+ - CBC ciphers in TLS &lt; 1.2 are considered to be vulnerable to the BEAST or Lucky 13 attacks
338
+
339
+ - Any cipher considered to be secure for only the next 10 years is considered as medium
340
+
341
+ - Any other cipher is considered as strong</tags>
342
+ <cert/>
343
+ <xref>NOXREF</xref>
344
+ </nvt>
345
+ <scan_nvt_version>$Revision: 342 $</scan_nvt_version>
346
+ <threat>Medium</threat>
347
+ <severity>4.3</severity>
348
+ <description>
349
+
350
+ Weak ciphers offered by this service:
351
+ SSL3_RSA_RC4_128_MD5
352
+ SSL3_RSA_RC4_128_SHA
353
+ SSL3_RSA_DES_64_CBC_SHA
354
+ SSL3_EDH_RSA_DES_64_CBC_SHA
355
+ SSL3_RSA_WITH_SEED_SHA
356
+ TLS1_RSA_RC4_128_MD5
357
+ TLS1_RSA_RC4_128_SHA
358
+ TLS1_RSA_DES_64_CBC_SHA
359
+ TLS1_EDH_RSA_DES_64_CBC_SHA
360
+ </description>
361
+ <original_threat>Medium</original_threat>
362
+ <original_severity>4.3</original_severity>
363
+ <notes/>
364
+ <overrides/>
365
+ </result>
366
+ <result id="3e4674f3-a6a6-4d9c-b3e9-ff54222cecb6">
367
+ <user_tags>
368
+ <count>0</count>
369
+ </user_tags>
370
+ <detection>
371
+ <result id="16c22b77-123d-4e35-bb84-699552c80400">
372
+ <details>
373
+ <detail>
374
+ <name>product</name>
375
+ <value>cpe:/a:apache:tomcat:6.0.26</value>
376
+ </detail>
377
+ <detail>
378
+ <name>location</name>
379
+ <value>8443/tcp</value>
380
+ </detail>
381
+ <detail>
382
+ <name>source_oid</name>
383
+ <value>1.3.6.1.4.1.25623.1.0.800371</value>
384
+ </detail>
385
+ <detail>
386
+ <name>source_name</name>
387
+ <value>Apache Tomcat Version Detection</value>
388
+ </detail>
389
+ </details>
390
+ </result>
391
+ </detection>
392
+ <host>10.10.10.10</host>
393
+ <port>8443/tcp</port>
394
+ <nvt oid="1.3.6.1.4.1.25623.1.0.103032">
395
+ <name>Apache Tomcat 'sort' and 'orderBy' Parameters Cross Site Scripting Vulnerabilities</name>
396
+ <family>Web Servers</family>
397
+ <cvss_base>4.3</cvss_base>
398
+ <cve>CVE-2010-4172</cve>
399
+ <bid>45015</bid>
400
+ <tags>cvss_base_vector=AV:N/AC:M/Au:N/C:N/I:P/A:N|solution=Updates are available
401
+ please see the references for more information.|summary=Apache Tomcat is prone to multiple cross-site scripting
402
+ vulnerabilities because it fails to properly sanitize user-
403
+ supplied input.
404
+
405
+ An attacker may leverage these issues to execute arbitrary script code
406
+ in the browser of an unsuspecting user in the context of the affected
407
+ site. This may let the attacker steal cookie-based authentication
408
+ credentials and launch other attacks.</tags>
409
+ <cert>
410
+ <cert_ref id="DFN-CERT-2012-1832" type="DFN-CERT"/>
411
+ <cert_ref id="DFN-CERT-2011-0793" type="DFN-CERT"/>
412
+ <cert_ref id="DFN-CERT-2011-0181" type="DFN-CERT"/>
413
+ </cert>
414
+ <xref>URL:https://www.securityfocus.com/bid/45015, URL:http://tomcat.apache.org/security-6.html, URL:http://tomcat.apache.org/security-7.html, URL:http://tomcat.apache.org/security-6.html, URL:http://tomcat.apache.org/security-7.html, URL:http://jakarta.apache.org/tomcat/, URL:http://www.securityfocus.com/archive/1/514866</xref>
415
+ </nvt>
416
+ <scan_nvt_version>$Revision: 13 $</scan_nvt_version>
417
+ <threat>Medium</threat>
418
+ <severity>4.3</severity>
419
+ <description/>
420
+ <original_threat>Medium</original_threat>
421
+ <original_severity>4.3</original_severity>
422
+ <notes/>
423
+ <overrides/>
424
+ </result>
425
+ </results>
426
+ </report>
427
+ </report>