qualys 0.1.4 → 0.1.5

Sign up to get free protection for your applications and to get access to all the features.
Files changed (44) hide show
  1. checksums.yaml +4 -4
  2. data/.gitignore +3 -2
  3. data/.rubocop.yml +7 -0
  4. data/.rubocop_todo.yml +71 -0
  5. data/.travis.yml +13 -1
  6. data/Gemfile +3 -1
  7. data/Gemfile.lock +91 -0
  8. data/README.md +50 -10
  9. data/Rakefile +3 -4
  10. data/lib/qualys.rb +10 -11
  11. data/lib/qualys/api.rb +38 -47
  12. data/lib/qualys/auth.rb +11 -20
  13. data/lib/qualys/compliance.rb +3 -7
  14. data/lib/qualys/config.rb +3 -5
  15. data/lib/qualys/host.rb +17 -0
  16. data/lib/qualys/report.rb +90 -0
  17. data/lib/qualys/scans.rb +10 -22
  18. data/lib/qualys/version.rb +1 -1
  19. data/lib/qualys/vulnerability.rb +74 -0
  20. data/qualys.gemspec +18 -19
  21. data/spec/fixtures/vcr_cassettes/api_get.yml +52 -0
  22. data/spec/fixtures/vcr_cassettes/create_global_report.yml +68 -0
  23. data/spec/fixtures/vcr_cassettes/emptyscans.yml +35 -0
  24. data/spec/fixtures/vcr_cassettes/get.yml +107 -0
  25. data/spec/fixtures/vcr_cassettes/global_report.yml +17800 -0
  26. data/spec/fixtures/vcr_cassettes/load_global_report.yml +625 -0
  27. data/spec/fixtures/vcr_cassettes/login.yml +50 -0
  28. data/spec/fixtures/vcr_cassettes/logout.yml +50 -0
  29. data/spec/fixtures/vcr_cassettes/scan.yml +73 -0
  30. data/spec/fixtures/vcr_cassettes/scans.yml +89 -0
  31. data/spec/fixtures/vcr_cassettes/templates.yml +121 -0
  32. data/spec/fixtures/vcr_cassettes/try_load_not_existing_report.yml +63 -0
  33. data/spec/fixtures/vcr_cassettes/unlogged.yml +45 -0
  34. data/spec/fixtures/vcr_cassettes/wrong.yml +101 -0
  35. data/spec/qualys/api_spec.rb +27 -0
  36. data/spec/qualys/report_spec.rb +65 -0
  37. data/spec/qualys/scans_spec.rb +75 -0
  38. data/spec/qualys/version_spec.rb +11 -0
  39. data/spec/qualys/vulnerability_spec.rb +53 -0
  40. data/spec/qualys_spec.rb +20 -0
  41. data/spec/spec_helper.rb +37 -0
  42. metadata +61 -15
  43. data/.rock.yml +0 -17
  44. data/lib/qualys/reports.rb +0 -47
@@ -0,0 +1,625 @@
1
+ ---
2
+ http_interactions:
3
+ - request:
4
+ method: get
5
+ uri: https://qualysapi.qualys.eu/api/2.0/fo/report/?action=fetch&id=4888430
6
+ body:
7
+ encoding: US-ASCII
8
+ string: ''
9
+ headers:
10
+ X-Requested-With:
11
+ - Qualys Ruby Client v0.1.3
12
+ response:
13
+ status:
14
+ code: 200
15
+ message: OK
16
+ headers:
17
+ Date:
18
+ - Tue, 12 Dec 2017 10:00:00 GMT
19
+ Server:
20
+ - Qualys
21
+ X-Xss-Protection:
22
+ - '1'
23
+ X-Content-Type-Options:
24
+ - nosniff
25
+ X-Frame-Options:
26
+ - SAMEORIGIN
27
+ Expires:
28
+ - Thu, 19 Nov 1981 08:52:00 GMT
29
+ Cache-Control:
30
+ - ''
31
+ Pragma:
32
+ - ''
33
+ X-Ratelimit-Limit:
34
+ - '300'
35
+ X-Ratelimit-Window-Sec:
36
+ - '3600'
37
+ X-Concurrency-Limit-Limit:
38
+ - '2'
39
+ X-Concurrency-Limit-Running:
40
+ - '0'
41
+ X-Ratelimit-Towait-Sec:
42
+ - '0'
43
+ X-Ratelimit-Remaining:
44
+ - '292'
45
+ Content-Length:
46
+ - '55643'
47
+ Content-Disposition:
48
+ - attachment; filename=Scan_Report_Generated_by_Ruby_Qualys_gem_Thomas_20171212.xml
49
+ Content-Type:
50
+ - application/xml
51
+ body:
52
+ encoding: UTF-8
53
+ string: "<?xml version=\"1.0\" encoding=\"UTF-8\" ?>\n\n<!DOCTYPE ASSET_DATA_REPORT
54
+ SYSTEM \"https://qualysguard.qualys.eu/asset_data_report.dtd\">\n<ASSET_DATA_REPORT>\n
55
+ \ <HEADER>\n <COMPANY><![CDATA[ACME]]></COMPANY>\n <USERNAME>Thomas</USERNAME>\n
56
+ \ <GENERATION_DATETIME>2017-12-12T09:55:42Z</GENERATION_DATETIME>\n <TEMPLATE><![CDATA[Technical
57
+ Report]]></TEMPLATE>\n <TARGET>\n <USER_ASSET_GROUPS>\n <ASSET_GROUP_TITLE><![CDATA[All]]></ASSET_GROUP_TITLE>\n
58
+ \ </USER_ASSET_GROUPS>\n <COMBINED_IP_LIST>\n <RANGE>\n <START>47.69.112.62</START>\n
59
+ \ <END>47.69.112.62</END>\n </RANGE>\n <RANGE>\n <START>88.78.187.177</START>\n
60
+ \ <END>88.78.187.177</END>\n </RANGE>\n <RANGE>\n <START>192.168.1.100</START>\n
61
+ \ <END>192.168.1.100</END>\n </RANGE>\n </COMBINED_IP_LIST>\n
62
+ \ </TARGET>\n <RISK_SCORE_SUMMARY>\n <TOTAL_VULNERABILITIES>19</TOTAL_VULNERABILITIES>\n
63
+ \ <AVG_SECURITY_RISK>2.4</AVG_SECURITY_RISK>\n <BUSINESS_RISK>12/100</BUSINESS_RISK>\n
64
+ \ </RISK_SCORE_SUMMARY>\n </HEADER>\n <HOST_LIST>\n <HOST>\n <IP>47.69.112.62</IP>\n
65
+ \ <TRACKING_METHOD>IP</TRACKING_METHOD>\n <DNS><![CDATA[12.ip-34-56-789.ab]]></DNS>\n
66
+ \ <OPERATING_SYSTEM><![CDATA[Ubuntu / Tiny Core Linux / Linux 2.6.x]]></OPERATING_SYSTEM>\n
67
+ \ <VULN_INFO_LIST>\n <VULN_INFO>\n <QID id=\"qid_38173\">38173</QID>\n
68
+ \ <TYPE>Vuln</TYPE>\n <PORT>25</PORT>\n <SERVICE>smtp</SERVICE>\n
69
+ \ <PROTOCOL>tcp</PROTOCOL>\n <SSL>true</SSL>\n <RESULT><![CDATA[Certificate
70
+ #0 CN=localhost.localdomain self signed certificate]]></RESULT>\n <FIRST_FOUND>2017-12-07T08:12:19Z</FIRST_FOUND>\n
71
+ \ <LAST_FOUND>2017-12-07T08:12:19Z</LAST_FOUND>\n <TIMES_FOUND>1</TIMES_FOUND>\n
72
+ \ <VULN_STATUS>New</VULN_STATUS>\n </VULN_INFO>\n <VULN_INFO>\n
73
+ \ <QID id=\"qid_38685\">38685</QID>\n <TYPE>Vuln</TYPE>\n
74
+ \ <PORT>25</PORT>\n <SERVICE>smtp</SERVICE>\n <PROTOCOL>tcp</PROTOCOL>\n
75
+ \ <SSL>true</SSL>\n <RESULT><![CDATA[Certificate #0 CN=localhost.localdomain
76
+ \ is valid for more than 39 months]]></RESULT>\n <FIRST_FOUND>2017-12-07T08:12:19Z</FIRST_FOUND>\n
77
+ \ <LAST_FOUND>2017-12-07T08:12:19Z</LAST_FOUND>\n <TIMES_FOUND>1</TIMES_FOUND>\n
78
+ \ <VULN_STATUS>New</VULN_STATUS>\n </VULN_INFO>\n <VULN_INFO>\n
79
+ \ <QID id=\"qid_38169\">38169</QID>\n <TYPE>Vuln</TYPE>\n
80
+ \ <PORT>25</PORT>\n <SERVICE>smtp</SERVICE>\n <PROTOCOL>tcp</PROTOCOL>\n
81
+ \ <SSL>true</SSL>\n <RESULT><![CDATA[Certificate #0 CN=localhost.localdomain
82
+ \ is a self signed certificate.]]></RESULT>\n <FIRST_FOUND>2017-12-07T08:12:19Z</FIRST_FOUND>\n
83
+ \ <LAST_FOUND>2017-12-07T08:12:19Z</LAST_FOUND>\n <TIMES_FOUND>1</TIMES_FOUND>\n
84
+ \ <VULN_STATUS>New</VULN_STATUS>\n </VULN_INFO>\n <VULN_INFO>\n
85
+ \ <QID id=\"qid_38170\">38170</QID>\n <TYPE>Vuln</TYPE>\n
86
+ \ <PORT>25</PORT>\n <SERVICE>smtp</SERVICE>\n <PROTOCOL>tcp</PROTOCOL>\n
87
+ \ <SSL>true</SSL>\n <RESULT><![CDATA[Certificate #0 CN=localhost.localdomain
88
+ (localhost.localdomain) doesn&apos;t resolve]]></RESULT>\n <FIRST_FOUND>2017-12-07T08:12:19Z</FIRST_FOUND>\n
89
+ \ <LAST_FOUND>2017-12-07T08:12:19Z</LAST_FOUND>\n <TIMES_FOUND>1</TIMES_FOUND>\n
90
+ \ <VULN_STATUS>New</VULN_STATUS>\n </VULN_INFO>\n <VULN_INFO>\n
91
+ \ <QID id=\"qid_38628\">38628</QID>\n <TYPE>Vuln</TYPE>\n
92
+ \ <PORT>25</PORT>\n <SERVICE>smtp</SERVICE>\n <PROTOCOL>tcp</PROTOCOL>\n
93
+ \ <SSL>true</SSL>\n <RESULT><![CDATA[TLSv1.0 is supported]]></RESULT>\n
94
+ \ <FIRST_FOUND>2017-12-07T08:12:19Z</FIRST_FOUND>\n <LAST_FOUND>2017-12-07T08:12:19Z</LAST_FOUND>\n
95
+ \ <TIMES_FOUND>1</TIMES_FOUND>\n <VULN_STATUS>New</VULN_STATUS>\n
96
+ \ </VULN_INFO>\n <VULN_INFO>\n <QID id=\"qid_38601\">38601</QID>\n
97
+ \ <TYPE>Vuln</TYPE>\n <PORT>25</PORT>\n <SERVICE>smtp</SERVICE>\n
98
+ \ <PROTOCOL>tcp</PROTOCOL>\n <SSL>true</SSL>\n <RESULT
99
+ format=\"table\"><![CDATA[CIPHER\tKEY-EXCHANGE\tAUTHENTICATION\tMAC\tENCRYPTION(KEY-STRENGTH)\tGRADE\nSSLv3
100
+ WITH RC4 CIPHERs IS SUPPORTED\t \t \t \t \t \nEXP-RC4-MD5\tRSA(512)\tRSA\tMD5\tRC4(40)\tLOW\nRC4-MD5\tRSA\tRSA\tMD5\tRC4(128)\tMEDIUM\nRC4-SHA\tRSA\tRSA\tSHA1\tRC4(128)\tMEDIUM\nEXP-ADH-RC4-MD5\tDH(512)\tNone\tMD5\tRC4(40)\tLOW\nADH-RC4-MD5\tDH\tNone\tMD5\tRC4(128)\tMEDIUM\nECDHE-RSA-RC4-SHA\tECDH\tRSA\tSHA1\tRC4(128)\tMEDIUM\nAECDH-RC4-SHA\tECDH\tNone\tSHA1\tRC4(128)\tMEDIUM\nTLSv1
101
+ WITH RC4 CIPHERs IS SUPPORTED\t \t \t \t \t \nEXP-RC4-MD5\tRSA(512)\tRSA\tMD5\tRC4(40)\tLOW\nRC4-MD5\tRSA\tRSA\tMD5\tRC4(128)\tMEDIUM\nRC4-SHA\tRSA\tRSA\tSHA1\tRC4(128)\tMEDIUM\nEXP-ADH-RC4-MD5\tDH(512)\tNone\tMD5\tRC4(40)\tLOW\nADH-RC4-MD5\tDH\tNone\tMD5\tRC4(128)\tMEDIUM\nECDHE-RSA-RC4-SHA\tECDH\tRSA\tSHA1\tRC4(128)\tMEDIUM\nAECDH-RC4-SHA\tECDH\tNone\tSHA1\tRC4(128)\tMEDIUM\nTLSv1.1
102
+ WITH RC4 CIPHERs IS SUPPORTED\t \t \t \t \t \nEXP-RC4-MD5\tRSA(512)\tRSA\tMD5\tRC4(40)\tLOW\nRC4-MD5\tRSA\tRSA\tMD5\tRC4(128)\tMEDIUM\nRC4-SHA\tRSA\tRSA\tSHA1\tRC4(128)\tMEDIUM\nEXP-ADH-RC4-MD5\tDH(512)\tNone\tMD5\tRC4(40)\tLOW\nADH-RC4-MD5\tDH\tNone\tMD5\tRC4(128)\tMEDIUM\nECDHE-RSA-RC4-SHA\tECDH\tRSA\tSHA1\tRC4(128)\tMEDIUM\nAECDH-RC4-SHA\tECDH\tNone\tSHA1\tRC4(128)\tMEDIUM\nTLSv1.2
103
+ WITH RC4 CIPHERs IS SUPPORTED\t \t \t \t \t \nEXP-RC4-MD5\tRSA(512)\tRSA\tMD5\tRC4(40)\tLOW\nRC4-MD5\tRSA\tRSA\tMD5\tRC4(128)\tMEDIUM\nRC4-SHA\tRSA\tRSA\tSHA1\tRC4(128)\tMEDIUM\nEXP-ADH-RC4-MD5\tDH(512)\tNone\tMD5\tRC4(40)\tLOW\nADH-RC4-MD5\tDH\tNone\tMD5\tRC4(128)\tMEDIUM\nECDHE-RSA-RC4-SHA\tECDH\tRSA\tSHA1\tRC4(128)\tMEDIUM\nAECDH-RC4-SHA\tECDH\tNone\tSHA1\tRC4(128)\tMEDIUM]]></RESULT>\n
104
+ \ <FIRST_FOUND>2017-12-07T08:12:19Z</FIRST_FOUND>\n <LAST_FOUND>2017-12-07T08:12:19Z</LAST_FOUND>\n
105
+ \ <TIMES_FOUND>1</TIMES_FOUND>\n <VULN_STATUS>New</VULN_STATUS>\n
106
+ \ </VULN_INFO>\n <VULN_INFO>\n <QID id=\"qid_38140\">38140</QID>\n
107
+ \ <TYPE>Vuln</TYPE>\n <PORT>25</PORT>\n <SERVICE>smtp</SERVICE>\n
108
+ \ <PROTOCOL>tcp</PROTOCOL>\n <SSL>true</SSL>\n <RESULT
109
+ format=\"table\"><![CDATA[CIPHER\tKEY-EXCHANGE\tAUTHENTICATION\tMAC\tENCRYPTION(KEY-STRENGTH)\tGRADE\nSSLv3
110
+ WEAK CIPHERS\t \t \t \t \t \nEXP-RC4-MD5\tRSA(512)\tRSA\tMD5\tRC4(40)\tLOW\nEXP-RC2-CBC-MD5\tRSA(512)\tRSA\tMD5\tRC2(40)\tLOW\nEXP-DES-CBC-SHA\tRSA(512)\tRSA\tSHA1\tDES(40)\tLOW\nDES-CBC-SHA\tRSA\tRSA\tSHA1\tDES(56)\tLOW\nEXP-EDH-RSA-DES-CBC-SHA\tDH(512)\tRSA\tSHA1\tDES(40)\tLOW\nEDH-RSA-DES-CBC-SHA\tDH\tRSA\tSHA1\tDES(56)\tLOW\nEXP-ADH-RC4-MD5\tDH(512)\tNone\tMD5\tRC4(40)\tLOW\nEXP-ADH-DES-CBC-SHA\tDH(512)\tNone\tSHA1\tDES(40)\tLOW\nADH-DES-CBC-SHA\tDH\tNone\tSHA1\tDES(56)\tLOW\nTLSv1
111
+ WEAK CIPHERS\t \t \t \t \t \nEXP-RC4-MD5\tRSA(512)\tRSA\tMD5\tRC4(40)\tLOW\nEXP-RC2-CBC-MD5\tRSA(512)\tRSA\tMD5\tRC2(40)\tLOW\nEXP-DES-CBC-SHA\tRSA(512)\tRSA\tSHA1\tDES(40)\tLOW\nDES-CBC-SHA\tRSA\tRSA\tSHA1\tDES(56)\tLOW\nEXP-EDH-RSA-DES-CBC-SHA\tDH(512)\tRSA\tSHA1\tDES(40)\tLOW\nEDH-RSA-DES-CBC-SHA\tDH\tRSA\tSHA1\tDES(56)\tLOW\nEXP-ADH-RC4-MD5\tDH(512)\tNone\tMD5\tRC4(40)\tLOW\nEXP-ADH-DES-CBC-SHA\tDH(512)\tNone\tSHA1\tDES(40)\tLOW\nADH-DES-CBC-SHA\tDH\tNone\tSHA1\tDES(56)\tLOW\nTLSv1.1
112
+ WEAK CIPHERS\t \t \t \t \t \nEXP-RC4-MD5\tRSA(512)\tRSA\tMD5\tRC4(40)\tLOW\nEXP-RC2-CBC-MD5\tRSA(512)\tRSA\tMD5\tRC2(40)\tLOW\nEXP-DES-CBC-SHA\tRSA(512)\tRSA\tSHA1\tDES(40)\tLOW\nDES-CBC-SHA\tRSA\tRSA\tSHA1\tDES(56)\tLOW\nEXP-EDH-RSA-DES-CBC-SHA\tDH(512)\tRSA\tSHA1\tDES(40)\tLOW\nEDH-RSA-DES-CBC-SHA\tDH\tRSA\tSHA1\tDES(56)\tLOW\nEXP-ADH-RC4-MD5\tDH(512)\tNone\tMD5\tRC4(40)\tLOW\nEXP-ADH-DES-CBC-SHA\tDH(512)\tNone\tSHA1\tDES(40)\tLOW\nADH-DES-CBC-SHA\tDH\tNone\tSHA1\tDES(56)\tLOW\nTLSv1.2
113
+ WEAK CIPHERS\t \t \t \t \t \nEXP-RC4-MD5\tRSA(512)\tRSA\tMD5\tRC4(40)\tLOW\nEXP-RC2-CBC-MD5\tRSA(512)\tRSA\tMD5\tRC2(40)\tLOW\nEXP-DES-CBC-SHA\tRSA(512)\tRSA\tSHA1\tDES(40)\tLOW\nDES-CBC-SHA\tRSA\tRSA\tSHA1\tDES(56)\tLOW\nEXP-EDH-RSA-DES-CBC-SHA\tDH(512)\tRSA\tSHA1\tDES(40)\tLOW\nEDH-RSA-DES-CBC-SHA\tDH\tRSA\tSHA1\tDES(56)\tLOW\nEXP-ADH-RC4-MD5\tDH(512)\tNone\tMD5\tRC4(40)\tLOW\nEXP-ADH-DES-CBC-SHA\tDH(512)\tNone\tSHA1\tDES(40)\tLOW\nADH-DES-CBC-SHA\tDH\tNone\tSHA1\tDES(56)\tLOW]]></RESULT>\n
114
+ \ <FIRST_FOUND>2017-12-07T08:12:19Z</FIRST_FOUND>\n <LAST_FOUND>2017-12-07T08:12:19Z</LAST_FOUND>\n
115
+ \ <TIMES_FOUND>1</TIMES_FOUND>\n <VULN_STATUS>New</VULN_STATUS>\n
116
+ \ </VULN_INFO>\n <VULN_INFO>\n <QID id=\"qid_38142\">38142</QID>\n
117
+ \ <TYPE>Vuln</TYPE>\n <PORT>25</PORT>\n <SERVICE>smtp</SERVICE>\n
118
+ \ <PROTOCOL>tcp</PROTOCOL>\n <SSL>true</SSL>\n <RESULT
119
+ format=\"table\"><![CDATA[CIPHER\tKEY-EXCHANGE\tAUTHENTICATION\tMAC\tENCRYPTION(KEY-STRENGTH)\tGRADE\nSSLv3
120
+ SUPPORTS CIPHERS WITH NO AUTHENTICATION\t \t \t \t \t \nEXP-ADH-RC4-MD5\tDH(512)\tNone\tMD5\tRC4(40)\tLOW\nADH-RC4-MD5\tDH\tNone\tMD5\tRC4(128)\tMEDIUM\nEXP-ADH-DES-CBC-SHA\tDH(512)\tNone\tSHA1\tDES(40)\tLOW\nADH-DES-CBC-SHA\tDH\tNone\tSHA1\tDES(56)\tLOW\nADH-DES-CBC3-SHA\tDH\tNone\tSHA1\t3DES(168)\tMEDIUM\nADH-AES128-SHA\tDH\tNone\tSHA1\tAES(128)\tMEDIUM\nADH-AES256-SHA\tDH\tNone\tSHA1\tAES(256)\tHIGH\nADH-CAMELLIA128-SHA\tDH\tNone\tSHA1\tCamellia(128)\tMEDIUM\nADH-CAMELLIA256-SHA\tDH\tNone\tSHA1\tCamellia(256)\tHIGH\nADH-SEED-SHA\tDH\tNone\tSHA1\tSEED(128)\tMEDIUM\nAECDH-RC4-SHA\tECDH\tNone\tSHA1\tRC4(128)\tMEDIUM\nAECDH-DES-CBC3-SHA\tECDH\tNone\tSHA1\t3DES(168)\tMEDIUM\nAECDH-AES128-SHA\tECDH\tNone\tSHA1\tAES(128)\tMEDIUM\nAECDH-AES256-SHA\tECDH\tNone\tSHA1\tAES(256)\tHIGH\nTLSv1
121
+ SUPPORTS CIPHERS WITH NO AUTHENTICATION\t \t \t \t \t \nEXP-ADH-RC4-MD5\tDH(512)\tNone\tMD5\tRC4(40)\tLOW\nADH-RC4-MD5\tDH\tNone\tMD5\tRC4(128)\tMEDIUM\nEXP-ADH-DES-CBC-SHA\tDH(512)\tNone\tSHA1\tDES(40)\tLOW\nADH-DES-CBC-SHA\tDH\tNone\tSHA1\tDES(56)\tLOW\nADH-DES-CBC3-SHA\tDH\tNone\tSHA1\t3DES(168)\tMEDIUM\nADH-AES128-SHA\tDH\tNone\tSHA1\tAES(128)\tMEDIUM\nADH-AES256-SHA\tDH\tNone\tSHA1\tAES(256)\tHIGH\nADH-CAMELLIA128-SHA\tDH\tNone\tSHA1\tCamellia(128)\tMEDIUM\nADH-CAMELLIA256-SHA\tDH\tNone\tSHA1\tCamellia(256)\tHIGH\nADH-SEED-SHA\tDH\tNone\tSHA1\tSEED(128)\tMEDIUM\nAECDH-RC4-SHA\tECDH\tNone\tSHA1\tRC4(128)\tMEDIUM\nAECDH-DES-CBC3-SHA\tECDH\tNone\tSHA1\t3DES(168)\tMEDIUM\nAECDH-AES128-SHA\tECDH\tNone\tSHA1\tAES(128)\tMEDIUM\nAECDH-AES256-SHA\tECDH\tNone\tSHA1\tAES(256)\tHIGH\nTLSv1.1
122
+ SUPPORTS CIPHERS WITH NO AUTHENTICATION\t \t \t \t \t \nEXP-ADH-RC4-MD5\tDH(512)\tNone\tMD5\tRC4(40)\tLOW\nADH-RC4-MD5\tDH\tNone\tMD5\tRC4(128)\tMEDIUM\nEXP-ADH-DES-CBC-SHA\tDH(512)\tNone\tSHA1\tDES(40)\tLOW\nADH-DES-CBC-SHA\tDH\tNone\tSHA1\tDES(56)\tLOW\nADH-DES-CBC3-SHA\tDH\tNone\tSHA1\t3DES(168)\tMEDIUM\nADH-AES128-SHA\tDH\tNone\tSHA1\tAES(128)\tMEDIUM\nADH-AES256-SHA\tDH\tNone\tSHA1\tAES(256)\tHIGH\nADH-CAMELLIA128-SHA\tDH\tNone\tSHA1\tCamellia(128)\tMEDIUM\nADH-CAMELLIA256-SHA\tDH\tNone\tSHA1\tCamellia(256)\tHIGH\nADH-SEED-SHA\tDH\tNone\tSHA1\tSEED(128)\tMEDIUM\nAECDH-RC4-SHA\tECDH\tNone\tSHA1\tRC4(128)\tMEDIUM\nAECDH-DES-CBC3-SHA\tECDH\tNone\tSHA1\t3DES(168)\tMEDIUM\nAECDH-AES128-SHA\tECDH\tNone\tSHA1\tAES(128)\tMEDIUM\nAECDH-AES256-SHA\tECDH\tNone\tSHA1\tAES(256)\tHIGH\nTLSv1.2
123
+ SUPPORTS CIPHERS WITH NO AUTHENTICATION\t \t \t \t \t \nEXP-ADH-RC4-MD5\tDH(512)\tNone\tMD5\tRC4(40)\tLOW\nADH-RC4-MD5\tDH\tNone\tMD5\tRC4(128)\tMEDIUM\nEXP-ADH-DES-CBC-SHA\tDH(512)\tNone\tSHA1\tDES(40)\tLOW\nADH-DES-CBC-SHA\tDH\tNone\tSHA1\tDES(56)\tLOW\nADH-DES-CBC3-SHA\tDH\tNone\tSHA1\t3DES(168)\tMEDIUM\nADH-AES128-SHA\tDH\tNone\tSHA1\tAES(128)\tMEDIUM\nADH-AES256-SHA\tDH\tNone\tSHA1\tAES(256)\tHIGH\nADH-CAMELLIA128-SHA\tDH\tNone\tSHA1\tCamellia(128)\tMEDIUM\nADH-AES128-SHA256\tDH\tNone\tSHA256\tAES(128)\tMEDIUM\nADH-AES256-SHA256\tDH\tNone\tSHA256\tAES(256)\tHIGH\nADH-CAMELLIA256-SHA\tDH\tNone\tSHA1\tCamellia(256)\tHIGH\nADH-SEED-SHA\tDH\tNone\tSHA1\tSEED(128)\tMEDIUM\nADH-AES128-GCM-SHA256\tDH\tNone\tAEAD\tAESGCM(128)\tMEDIUM\nADH-AES256-GCM-SHA384\tDH\tNone\tAEAD\tAESGCM(256)\tHIGH\nAECDH-RC4-SHA\tECDH\tNone\tSHA1\tRC4(128)\tMEDIUM\nAECDH-DES-CBC3-SHA\tECDH\tNone\tSHA1\t3DES(168)\tMEDIUM\nAECDH-AES128-SHA\tECDH\tNone\tSHA1\tAES(128)\tMEDIUM\nAECDH-AES256-SHA\tECDH\tNone\tSHA1\tAES(256)\tHIGH]]></RESULT>\n
124
+ \ <FIRST_FOUND>2017-12-07T08:12:19Z</FIRST_FOUND>\n <LAST_FOUND>2017-12-07T08:12:19Z</LAST_FOUND>\n
125
+ \ <TIMES_FOUND>1</TIMES_FOUND>\n <VULN_STATUS>New</VULN_STATUS>\n
126
+ \ </VULN_INFO>\n <VULN_INFO>\n <QID id=\"qid_38657\">38657</QID>\n
127
+ \ <TYPE>Vuln</TYPE>\n <PORT>25</PORT>\n <SERVICE>smtp</SERVICE>\n
128
+ \ <PROTOCOL>tcp</PROTOCOL>\n <SSL>true</SSL>\n <RESULT
129
+ format=\"table\"><![CDATA[CIPHER\tKEY-EXCHANGE\tAUTHENTICATION\tMAC\tENCRYPTION(KEY-STRENGTH)\tGRADE\nSSLv3
130
+ WITH DES/3DES CIPHERs IS SUPPORTED\t \t \t \t \t \nEXP-DES-CBC-SHA\tRSA(512)\tRSA\tSHA1\tDES(40)\tLOW\nDES-CBC-SHA\tRSA\tRSA\tSHA1\tDES(56)\tLOW\nDES-CBC3-SHA\tRSA\tRSA\tSHA1\t3DES(168)\tMEDIUM\nEXP-EDH-RSA-DES-CBC-SHA\tDH(512)\tRSA\tSHA1\tDES(40)\tLOW\nEDH-RSA-DES-CBC-SHA\tDH\tRSA\tSHA1\tDES(56)\tLOW\nEDH-RSA-DES-CBC3-SHA\tDH\tRSA\tSHA1\t3DES(168)\tMEDIUM\nEXP-ADH-DES-CBC-SHA\tDH(512)\tNone\tSHA1\tDES(40)\tLOW\nADH-DES-CBC-SHA\tDH\tNone\tSHA1\tDES(56)\tLOW\nADH-DES-CBC3-SHA\tDH\tNone\tSHA1\t3DES(168)\tMEDIUM\nECDHE-RSA-DES-CBC3-SHA\tECDH\tRSA\tSHA1\t3DES(168)\tMEDIUM\nAECDH-DES-CBC3-SHA\tECDH\tNone\tSHA1\t3DES(168)\tMEDIUM\nTLSv1
131
+ WITH DES/3DES CIPHERs IS SUPPORTED\t \t \t \t \t \nEXP-DES-CBC-SHA\tRSA(512)\tRSA\tSHA1\tDES(40)\tLOW\nDES-CBC-SHA\tRSA\tRSA\tSHA1\tDES(56)\tLOW\nDES-CBC3-SHA\tRSA\tRSA\tSHA1\t3DES(168)\tMEDIUM\nEXP-EDH-RSA-DES-CBC-SHA\tDH(512)\tRSA\tSHA1\tDES(40)\tLOW\nEDH-RSA-DES-CBC-SHA\tDH\tRSA\tSHA1\tDES(56)\tLOW\nEDH-RSA-DES-CBC3-SHA\tDH\tRSA\tSHA1\t3DES(168)\tMEDIUM\nEXP-ADH-DES-CBC-SHA\tDH(512)\tNone\tSHA1\tDES(40)\tLOW\nADH-DES-CBC-SHA\tDH\tNone\tSHA1\tDES(56)\tLOW\nADH-DES-CBC3-SHA\tDH\tNone\tSHA1\t3DES(168)\tMEDIUM\nECDHE-RSA-DES-CBC3-SHA\tECDH\tRSA\tSHA1\t3DES(168)\tMEDIUM\nAECDH-DES-CBC3-SHA\tECDH\tNone\tSHA1\t3DES(168)\tMEDIUM\nTLSv1.1
132
+ WITH DES/3DES CIPHERs IS SUPPORTED\t \t \t \t \t \nEXP-DES-CBC-SHA\tRSA(512)\tRSA\tSHA1\tDES(40)\tLOW\nDES-CBC-SHA\tRSA\tRSA\tSHA1\tDES(56)\tLOW\nDES-CBC3-SHA\tRSA\tRSA\tSHA1\t3DES(168)\tMEDIUM\nEXP-EDH-RSA-DES-CBC-SHA\tDH(512)\tRSA\tSHA1\tDES(40)\tLOW\nEDH-RSA-DES-CBC-SHA\tDH\tRSA\tSHA1\tDES(56)\tLOW\nEDH-RSA-DES-CBC3-SHA\tDH\tRSA\tSHA1\t3DES(168)\tMEDIUM\nEXP-ADH-DES-CBC-SHA\tDH(512)\tNone\tSHA1\tDES(40)\tLOW\nADH-DES-CBC-SHA\tDH\tNone\tSHA1\tDES(56)\tLOW\nADH-DES-CBC3-SHA\tDH\tNone\tSHA1\t3DES(168)\tMEDIUM\nECDHE-RSA-DES-CBC3-SHA\tECDH\tRSA\tSHA1\t3DES(168)\tMEDIUM\nAECDH-DES-CBC3-SHA\tECDH\tNone\tSHA1\t3DES(168)\tMEDIUM\nTLSv1.2
133
+ WITH DES/3DES CIPHERs IS SUPPORTED\t \t \t \t \t \nEXP-DES-CBC-SHA\tRSA(512)\tRSA\tSHA1\tDES(40)\tLOW\nDES-CBC-SHA\tRSA\tRSA\tSHA1\tDES(56)\tLOW\nDES-CBC3-SHA\tRSA\tRSA\tSHA1\t3DES(168)\tMEDIUM\nEXP-EDH-RSA-DES-CBC-SHA\tDH(512)\tRSA\tSHA1\tDES(40)\tLOW\nEDH-RSA-DES-CBC-SHA\tDH\tRSA\tSHA1\tDES(56)\tLOW\nEDH-RSA-DES-CBC3-SHA\tDH\tRSA\tSHA1\t3DES(168)\tMEDIUM\nEXP-ADH-DES-CBC-SHA\tDH(512)\tNone\tSHA1\tDES(40)\tLOW\nADH-DES-CBC-SHA\tDH\tNone\tSHA1\tDES(56)\tLOW\nADH-DES-CBC3-SHA\tDH\tNone\tSHA1\t3DES(168)\tMEDIUM\nECDHE-RSA-DES-CBC3-SHA\tECDH\tRSA\tSHA1\t3DES(168)\tMEDIUM\nAECDH-DES-CBC3-SHA\tECDH\tNone\tSHA1\t3DES(168)\tMEDIUM]]></RESULT>\n
134
+ \ <FIRST_FOUND>2017-12-07T08:12:19Z</FIRST_FOUND>\n <LAST_FOUND>2017-12-07T08:12:19Z</LAST_FOUND>\n
135
+ \ <TIMES_FOUND>1</TIMES_FOUND>\n <VULN_STATUS>New</VULN_STATUS>\n
136
+ \ </VULN_INFO>\n <VULN_INFO>\n <QID id=\"qid_38606\">38606</QID>\n
137
+ \ <TYPE>Vuln</TYPE>\n <PORT>25</PORT>\n <SERVICE>smtp</SERVICE>\n
138
+ \ <PROTOCOL>tcp</PROTOCOL>\n <SSL>true</SSL>\n <RESULT><![CDATA[SSLv3
139
+ is supported]]></RESULT>\n <FIRST_FOUND>2017-12-07T08:12:19Z</FIRST_FOUND>\n
140
+ \ <LAST_FOUND>2017-12-07T08:12:19Z</LAST_FOUND>\n <TIMES_FOUND>1</TIMES_FOUND>\n
141
+ \ <VULN_STATUS>New</VULN_STATUS>\n </VULN_INFO>\n <VULN_INFO>\n
142
+ \ <QID id=\"qid_82003\">82003</QID>\n <TYPE>Vuln</TYPE>\n
143
+ \ <SSL>false</SSL>\n <RESULT><![CDATA[Timestamp of host (network
144
+ byte ordering): 08:05:40 GMT]]></RESULT>\n <FIRST_FOUND>2017-12-07T08:12:19Z</FIRST_FOUND>\n
145
+ \ <LAST_FOUND>2017-12-07T08:12:19Z</LAST_FOUND>\n <TIMES_FOUND>1</TIMES_FOUND>\n
146
+ \ <VULN_STATUS>New</VULN_STATUS>\n </VULN_INFO>\n <VULN_INFO>\n
147
+ \ <QID id=\"qid_38603\">38603</QID>\n <TYPE>Vuln</TYPE>\n
148
+ \ <PORT>25</PORT>\n <SERVICE>smtp</SERVICE>\n <PROTOCOL>tcp</PROTOCOL>\n
149
+ \ <SSL>false</SSL>\n <FIRST_FOUND>2017-12-07T08:12:19Z</FIRST_FOUND>\n
150
+ \ <LAST_FOUND>2017-12-07T08:12:19Z</LAST_FOUND>\n <TIMES_FOUND>1</TIMES_FOUND>\n
151
+ \ <VULN_STATUS>New</VULN_STATUS>\n </VULN_INFO>\n <VULN_INFO>\n
152
+ \ <QID id=\"qid_11827\">11827</QID>\n <TYPE>Vuln</TYPE>\n
153
+ \ <PORT>443</PORT>\n <SERVICE>http over ssl</SERVICE>\n <PROTOCOL>tcp</PROTOCOL>\n
154
+ \ <SSL>false</SSL>\n <RESULT><![CDATA[X-Frame-Options or
155
+ Content-Security-Policy: frame-ancestors HTTP Headers missing on port 443.\nGET
156
+ / HTTP/1.1\nHost: 12.ip-34-56-789.ab\nConnection: Keep-Alive\n\n\n\nX-XSS-Protection
157
+ HTTP Header missing on port 443.\nX-Content-Type-Options HTTP Header missing
158
+ on port 443.\nContent-Security-Policy HTTP Header missing on port 443.\nStrict-Transport-Security
159
+ HTTP Header missing on port 443.]]></RESULT>\n <FIRST_FOUND>2017-12-07T08:12:19Z</FIRST_FOUND>\n
160
+ \ <LAST_FOUND>2017-12-07T08:12:19Z</LAST_FOUND>\n <TIMES_FOUND>1</TIMES_FOUND>\n
161
+ \ <VULN_STATUS>New</VULN_STATUS>\n </VULN_INFO>\n <VULN_INFO>\n
162
+ \ <QID id=\"qid_11827\">11827</QID>\n <TYPE>Vuln</TYPE>\n
163
+ \ <PORT>80</PORT>\n <SERVICE>http</SERVICE>\n <PROTOCOL>tcp</PROTOCOL>\n
164
+ \ <SSL>false</SSL>\n <RESULT><![CDATA[X-Frame-Options or
165
+ Content-Security-Policy: frame-ancestors HTTP Headers missing on port 80.\nGET
166
+ / HTTP/1.1\nHost: 12.ip-34-56-789.ab\nConnection: Keep-Alive\n\n\n\nX-XSS-Protection
167
+ HTTP Header missing on port 80.\nX-Content-Type-Options HTTP Header missing
168
+ on port 80.\nContent-Security-Policy HTTP Header missing on port 80.]]></RESULT>\n
169
+ \ <FIRST_FOUND>2017-12-07T08:12:19Z</FIRST_FOUND>\n <LAST_FOUND>2017-12-07T08:12:19Z</LAST_FOUND>\n
170
+ \ <TIMES_FOUND>1</TIMES_FOUND>\n <VULN_STATUS>New</VULN_STATUS>\n
171
+ \ </VULN_INFO>\n <VULN_INFO>\n <QID id=\"qid_38628\">38628</QID>\n
172
+ \ <TYPE>Vuln</TYPE>\n <PORT>443</PORT>\n <SERVICE>http
173
+ over ssl</SERVICE>\n <PROTOCOL>tcp</PROTOCOL>\n <SSL>true</SSL>\n
174
+ \ <RESULT><![CDATA[TLSv1.0 is supported]]></RESULT>\n <FIRST_FOUND>2017-12-07T08:12:19Z</FIRST_FOUND>\n
175
+ \ <LAST_FOUND>2017-12-07T08:12:19Z</LAST_FOUND>\n <TIMES_FOUND>1</TIMES_FOUND>\n
176
+ \ <VULN_STATUS>New</VULN_STATUS>\n </VULN_INFO>\n <VULN_INFO>\n
177
+ \ <QID id=\"qid_38657\">38657</QID>\n <TYPE>Vuln</TYPE>\n
178
+ \ <PORT>443</PORT>\n <SERVICE>http over ssl</SERVICE>\n <PROTOCOL>tcp</PROTOCOL>\n
179
+ \ <SSL>true</SSL>\n <RESULT format=\"table\"><![CDATA[CIPHER\tKEY-EXCHANGE\tAUTHENTICATION\tMAC\tENCRYPTION(KEY-STRENGTH)\tGRADE\nTLSv1
180
+ WITH DES/3DES CIPHERs IS SUPPORTED\t \t \t \t \t \nDES-CBC3-SHA\tRSA\tRSA\tSHA1\t3DES(168)\tMEDIUM\nTLSv1.1
181
+ WITH DES/3DES CIPHERs IS SUPPORTED\t \t \t \t \t \nDES-CBC3-SHA\tRSA\tRSA\tSHA1\t3DES(168)\tMEDIUM\nTLSv1.2
182
+ WITH DES/3DES CIPHERs IS SUPPORTED\t \t \t \t \t \nDES-CBC3-SHA\tRSA\tRSA\tSHA1\t3DES(168)\tMEDIUM]]></RESULT>\n
183
+ \ <FIRST_FOUND>2017-12-07T08:12:19Z</FIRST_FOUND>\n <LAST_FOUND>2017-12-07T08:12:19Z</LAST_FOUND>\n
184
+ \ <TIMES_FOUND>1</TIMES_FOUND>\n <VULN_STATUS>New</VULN_STATUS>\n
185
+ \ </VULN_INFO>\n </VULN_INFO_LIST>\n </HOST>\n <HOST>\n <IP>88.78.187.177</IP>\n
186
+ \ <TRACKING_METHOD>IP</TRACKING_METHOD>\n <DNS><![CDATA[ip123.ip-45-67-891.eu]]></DNS>\n
187
+ \ <OPERATING_SYSTEM><![CDATA[Ubuntu / Fedora / Tiny Core Linux / Linux
188
+ 3.x]]></OPERATING_SYSTEM>\n <VULN_INFO_LIST>\n <VULN_INFO>\n <QID
189
+ id=\"qid_11827\">11827</QID>\n <TYPE>Vuln</TYPE>\n <PORT>80</PORT>\n
190
+ \ <SERVICE>http</SERVICE>\n <PROTOCOL>tcp</PROTOCOL>\n <SSL>false</SSL>\n
191
+ \ <RESULT><![CDATA[Content-Security-Policy HTTP Header missing on
192
+ port 80.\nGET / HTTP/1.1\nHost: ip123.ip-45-67-891.eu\nConnection: Keep-Alive]]></RESULT>\n
193
+ \ <FIRST_FOUND>2017-12-05T09:48:50Z</FIRST_FOUND>\n <LAST_FOUND>2017-12-05T09:48:50Z</LAST_FOUND>\n
194
+ \ <TIMES_FOUND>1</TIMES_FOUND>\n <VULN_STATUS>New</VULN_STATUS>\n
195
+ \ </VULN_INFO>\n <VULN_INFO>\n <QID id=\"qid_11827\">11827</QID>\n
196
+ \ <TYPE>Vuln</TYPE>\n <PORT>443</PORT>\n <SERVICE>http
197
+ over ssl</SERVICE>\n <PROTOCOL>tcp</PROTOCOL>\n <SSL>false</SSL>\n
198
+ \ <RESULT><![CDATA[Content-Security-Policy HTTP Header missing on
199
+ port 443.\nGET / HTTP/1.1\nHost: ip123.ip-45-67-891.eu\nConnection: Keep-Alive]]></RESULT>\n
200
+ \ <FIRST_FOUND>2017-12-05T09:48:50Z</FIRST_FOUND>\n <LAST_FOUND>2017-12-05T09:48:50Z</LAST_FOUND>\n
201
+ \ <TIMES_FOUND>1</TIMES_FOUND>\n <VULN_STATUS>New</VULN_STATUS>\n
202
+ \ </VULN_INFO>\n <VULN_INFO>\n <QID id=\"qid_38628\">38628</QID>\n
203
+ \ <TYPE>Vuln</TYPE>\n <PORT>443</PORT>\n <SERVICE>http
204
+ over ssl</SERVICE>\n <PROTOCOL>tcp</PROTOCOL>\n <SSL>true</SSL>\n
205
+ \ <RESULT><![CDATA[TLSv1.0 is supported]]></RESULT>\n <FIRST_FOUND>2017-12-05T09:48:50Z</FIRST_FOUND>\n
206
+ \ <LAST_FOUND>2017-12-05T09:48:50Z</LAST_FOUND>\n <TIMES_FOUND>1</TIMES_FOUND>\n
207
+ \ <VULN_STATUS>New</VULN_STATUS>\n </VULN_INFO>\n </VULN_INFO_LIST>\n
208
+ \ </HOST>\n </HOST_LIST>\n <GLOSSARY>\n <VULN_DETAILS_LIST>\n <VULN_DETAILS
209
+ id=\"qid_11827\">\n <QID id=\"qid_11827\">11827</QID>\n <TITLE><![CDATA[HTTP
210
+ Security Header Not Detected]]></TITLE>\n <SEVERITY>2</SEVERITY>\n
211
+ \ <CATEGORY>CGI</CATEGORY>\n <THREAT><![CDATA[This QID reports
212
+ the absence of the following <A HREF=\"https://www.owasp.org/index.php/OWASP_Secure_Headers_Project#tab=Headers\"
213
+ TARGET=\"_blank\">HTTP headers</A> according to <A HREF=\"https://cwe.mitre.org/data/definitions/693.html\"
214
+ TARGET=\"_blank\">CWE-693: Protection Mechanism Failure</A>:<BR>\nX-Frame-Options:
215
+ This HTTP response header improves the protection of web applications against
216
+ clickjacking attacks. Clickjacking, also known as a &quot;UI redress attack&quot;,
217
+ allows an attacker to use multiple transparent or opaque layers to trick a
218
+ targeted user into clicking on a button or link on another page when they
219
+ were intending to click on the the top level page. <BR>\nX-XSS-Protection:
220
+ This HTTP header enables the browser built-in Cross-Site Scripting (XSS) filter
221
+ to prevent cross-site scripting attacks. X-XSS-Protection: 0; disables this
222
+ functionality.<BR>\nX-Content-Type-Options: This HTTP header prevents attacks
223
+ based on MIME-type mismatch. The only possible value is nosniff. If your server
224
+ returns X-Content-Type-Options: nosniff in the response, the browser will
225
+ refuse to load the styles and scripts in case they have an incorrect MIME-type.
226
+ <BR>\nContent-Security-Policy: This HTTP header helps to detect and mitigate
227
+ certain types of attacks, including Cross Site Scripting (XSS), packet sniffing
228
+ attacks and data injection attacks.<BR>\nStrict-Transport-Security: The HTTP
229
+ Strict-Transport-Security response header (HSTS) is a security feature that
230
+ lets a web site tell browsers that it should only be communicated with using
231
+ HTTPS, instead of using HTTP.<P>\nQID Detection Logic:<BR>\nThis unauthenticated
232
+ QID looks for the presence of the following HTTP responses:<BR>\nValid directives
233
+ for X-Frame-Options are:<BR>\nX-Frame-Options: DENY - The page cannot be displayed
234
+ in a frame, regardless of the site attempting to do so.<BR>\nX-Frame-Options:
235
+ SAMEORIGIN - The page can only be displayed in a frame on the same origin
236
+ as the page itself.<BR>\nX-Frame-Options: ALLOW-FROM RESOURCE-URL - The page
237
+ can only be displayed in a frame on the specified origin.<P>\nContent-Security-Policy:
238
+ frame-ancestors - This directive specifies valid parents that may embed a
239
+ page using frame, iframe, object, embed, or applet\nValid directives for X-XSS-Protections
240
+ are:<BR>\nX-XSS-Protection: 1 - Enables XSS filtering (usually default in
241
+ browsers). If a cross-site scripting attack is detected, the browser will
242
+ sanitize the page (remove the unsafe parts).<BR>\nX-XSS-Protection: 1; mode=block
243
+ - Enables XSS filtering. Rather than sanitizing the page, the browser will
244
+ prevent rendering of the page if an attack is detected.<BR>\nX-XSS-Protection:
245
+ 1; report=URI - Enables XSS filtering. If a cross-site scripting attack is
246
+ detected, the browser will sanitize the page and report the violation. This
247
+ uses the functionality of the CSP report-uri directive to send a report.<BR>\nX-XSS-Protection:
248
+ 0 disables this directive and hence is also treated as not detected.<P>\nA
249
+ valid directive for X-Content-Type-Options: nosniff<P>\nA valid directive
250
+ for Content-Security-Policy: &lt;policy-directive&gt;; &lt;policy-directive&gt;<P>\nA
251
+ valid HSTS directive Strict-Transport-Security: max-age=&lt;expire-time&gt;;
252
+ [; includeSubDomains][; preload]<P>\n<B>NOTE:</B> All report-only directives
253
+ (where applicable) are considered invalid.]]></THREAT>\n <IMPACT><![CDATA[Depending
254
+ on the vulnerability being exploited, an unauthenticated remote attacker could
255
+ conduct cross-site scripting, clickjacking or MIME-type sniffing attacks.]]></IMPACT>\n
256
+ \ <SOLUTION><![CDATA[CWE-693: Protection Mechanism Failure mentions
257
+ the following - The product does not use or incorrectly uses a protection
258
+ mechanism that provides sufficient defense against directed attacks against
259
+ the product. A &quot;missing&quot; protection mechanism occurs when the application
260
+ does not define any mechanism against a certain class of attack. An &quot;insufficient&quot;
261
+ protection mechanism might provide some defenses - for example, against the
262
+ most common attacks - but it does not protect against everything that is intended.
263
+ Finally, an &quot;ignored&quot; mechanism occurs when a mechanism is available
264
+ and in active use within the product, but the developer has not applied it
265
+ in some code path.<P>\nCustomers are advised to set proper <A HREF=\"https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Frame-Options\"
266
+ TARGET=\"_blank\">X-Frame-Options</A>, <A HREF=\"https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-XSS-Protection\"
267
+ TARGET=\"_blank\">X-XSS-Protection</A>, <A HREF=\"https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP\"
268
+ TARGET=\"_blank\">Content Security Policy</A>, <A HREF=\"https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Content-Type-Options\"
269
+ TARGET=\"_blank\">X-Content-Type-Options</A> and <A HREF=\"https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security\"
270
+ TARGET=\"_blank\">Strict-Transport-Security</A> HTTP response headers.<P>\nDepending
271
+ on their server software, customers can set directives in their site configuration
272
+ or Web.config files. Few examples are:<P>\nX-Frame-Options:<BR>\nApache: Header
273
+ always append X-Frame-Options SAMEORIGIN<BR>\nnginx: add_header X-Frame-Options
274
+ SAMEORIGIN;<BR>\nHAProxy: rspadd X-Frame-Options:\\ SAMEORIGIN<BR>\nIIS: &lt;HTTPPROTOCOL&gt;&lt;CUSTOMHEADERS&gt;&lt;ADD
275
+ NAME=&quot;X-Frame-Options&quot; VALUE=&quot;SAMEORIGIN&quot;&gt;&lt;/ADD&gt;&lt;/CUSTOMHEADERS&gt;&lt;/HTTPPROTOCOL&gt;<P>\nX-XSS-Protection:<BR>\nApache:
276
+ Header always set X-XSS-Protection &quot;1; mode=block&quot; <BR>\nPHP: header(&quot;X-XSS-Protection:
277
+ 1; mode=block&quot;);<P>\nX-Content-Type-Options:<BR>\nApache: Header always
278
+ set X-Content-Type-Options: nosniff<P>\nContent-Security-Policy: (Please note
279
+ that these values may differ from website to website. The values below are
280
+ for informational purposes only. The scanner simply looks for the presence
281
+ of the security header.)<BR>\nApache: Header set Content-Security-Policy &quot;script-src
282
+ 'self'; object-src 'self'&quot;<BR>\nIIS: &lt;SYSTEM.WEBSERVER&gt;&lt;HTTPPROTOCOL&gt;&lt;CUSTOMHEADERS&gt;&lt;ADD
283
+ NAME=&quot;Content-Security-Policy&quot; VALUE=&quot;default-src 'self';&quot;&gt;&lt;/ADD&gt;&lt;/CUSTOMHEADERS&gt;&lt;/HTTPPROTOCOL&gt;&lt;/SYSTEM.WEBSERVER&gt;<BR>\nnginx:
284
+ add_header Content-Security-Policy &quot;default-src 'self'; script-src 'self';<P>\nHTTP
285
+ Strict-Transport-Security:<BR>\nApache: Header always set Strict-Transport-Security
286
+ &quot;max-age=31536000; includeSubDomains&quot;<BR>\nNginx: add_header Strict-Transport-Security
287
+ max-age=31536000;]]></SOLUTION>\n <PCI_FLAG>1</PCI_FLAG>\n <LAST_UPDATE>2017-11-09T00:47:11Z</LAST_UPDATE>\n
288
+ \ </VULN_DETAILS>\n <VULN_DETAILS id=\"qid_38140\">\n <QID
289
+ id=\"qid_38140\">38140</QID>\n <TITLE><![CDATA[SSL Server Supports
290
+ Weak Encryption Vulnerability]]></TITLE>\n <SEVERITY>3</SEVERITY>\n
291
+ \ <CATEGORY>General remote services</CATEGORY>\n <THREAT><![CDATA[The
292
+ Secure Socket Layer (SSL) protocol allows for secure communication between
293
+ a client and a server.\n<P>\nSSL encryption ciphers are classified based on
294
+ encryption key length as follows:<BR>\n<UL>\n<LI>HIGH - key length larger
295
+ than 128 bits\n<LI>MEDIUM - key length equal to 128 bits\n<LI>LOW - key length
296
+ smaller than 128 bits\n</UL>\n<P>\nMessages encrypted with LOW encryption
297
+ ciphers are easy to decrypt. Commercial SSL servers should only support MEDIUM
298
+ or HIGH strength ciphers to guarantee transaction security.\n<P>\nThe following
299
+ link provides more information about this vulnerability:\n<UL>\n<LI><A HREF=\"http://www.schneier.com/paper-ssl-revised.pdf\"
300
+ TARGET=\"_blank\">Analysis of the SSL 3.0 protocol</A>\n</UL>\n<P>\nPlease
301
+ note that this detection only checks for weak cipher support at the SSL layer.
302
+ Some servers may implement additional protection at the data layer. For example,
303
+ some SSL servers and SSL proxies (such as SSL accelerators) allow cipher negotiation
304
+ to complete but send back an error message and abort further communication
305
+ on the secure channel. This vulnerability may not be exploitable for such
306
+ configurations.]]></THREAT>\n <IMPACT><![CDATA[An attacker can exploit
307
+ this vulnerability to decrypt secure communications without authorization.]]></IMPACT>\n
308
+ \ <SOLUTION><![CDATA[Disable support for LOW encryption ciphers.<P>\n<B>Apache</B>\n<BR>
309
+ If TLSv1.1 or TLSv1.2 are available, then those protocols should be used.\n<BR>SSLProtocol
310
+ TLSv1.1 TLSv1.2<BR>\nIf TLSv1.1 and TLSv1.2 are not available then only TLS1.0
311
+ should be used:\n<BR>SSLProtocol TLSv1\n<BR>Typically, for Apache/mod_ssl,
312
+ httpd.conf or ssl.conf should have the following lines:<BR>\nSSLCipherSuite
313
+ ALL:!aNULL:!ADH:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM<BR><BR>\nFor Apache/apache_ssl
314
+ include the following line in the configuration file (httpsd.conf):<BR>\nSSLRequireCipher
315
+ ALL:!aNULL:!ADH:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM<BR><P>\n\n<B>Tomcat</B>\n<BR>\nsslProtocol=&quot;SSLv3&quot;
316
+ \ \n<BR>ciphers=&quot;SSL_RSA_WITH_RC4_128_MD5,SSL_RSA_WITH_RC4_128_SHA,SSL_DHE_RSA_W\n<BR>ITH_3DES_EDE_CBC_SHA&quot;\n<BR><P>\n<B>IIS</B>\n<BR>\n<A
317
+ HREF=\"http://support.microsoft.com/default.aspx?scid=kb;EN-US;245030\" TARGET=\"_blank\">How
318
+ to Restrict the Use of Certain Cryptographic Algorithms and Protocols in Schannel.dll</A>
319
+ (Windows restart required)\n<BR><A HREF=\"http://support.microsoft.com/default.aspx?scid=kb;en-us;187498\"
320
+ TARGET=\"_blank\">How to disable PCT 1.0, SSL 2.0, SSL 3.0, or TLS 1.0 in
321
+ Internet Information Services</A> (Windows restart required)\n<BR><A HREF=\"http://www.microsoft.com/technet/security/prodtech/IIS.mspx\"
322
+ TARGET=\"_blank\">Security Guidance for IIS</A>\n<P>For Novell Netware 6.5
323
+ please refer to the following document \n<A HREF=\"http://support.novell.com/cgi-bin/search/searchtid.cgi?10100633.htm\"
324
+ TARGET=\"_blank\">SSL Allows the use of Weak Ciphers. -TID10100633 </A>]]></SOLUTION>\n
325
+ \ <PCI_FLAG>1</PCI_FLAG>\n <LAST_UPDATE>2015-01-20T19:50:33Z</LAST_UPDATE>\n
326
+ \ </VULN_DETAILS>\n <VULN_DETAILS id=\"qid_38142\">\n <QID
327
+ id=\"qid_38142\">38142</QID>\n <TITLE><![CDATA[SSL Server Allows Anonymous
328
+ Authentication Vulnerability]]></TITLE>\n <SEVERITY>4</SEVERITY>\n
329
+ \ <CATEGORY>General remote services</CATEGORY>\n <THREAT><![CDATA[The
330
+ Secure Socket Layer (SSL) protocol allows for secure communication between
331
+ a client and a server. The client usually authenticates the server using an
332
+ algorithm like RSA or DSS. Some SSL ciphers allow SSL communication without
333
+ authentication. Most common Web browsers like Microsoft Internet Explorer,
334
+ Netscape and Mozilla do not use anonymous authentication ciphers by default.\n\n<P>A
335
+ vulnerability exists in SSL communications when clients are allowed to connect\nusing
336
+ no authentication algorithm. SSL client-server communication may use several
337
+ different types of\nauthentication: RSA, Diffie-Hellman, DSS or none. When
338
+ 'none' is used, the\ncommunications are vulnerable to a man-in-the-middle
339
+ attack.&quot;]]></THREAT>\n <IMPACT><![CDATA[An attacker can exploit
340
+ this vulnerability to impersonate your server to clients.]]></IMPACT>\n <SOLUTION><![CDATA[Disable
341
+ support for anonymous authentication.<P>\n<B>1) How to disable for Apache:</B>\n<BR>Typically,
342
+ for Apache/mod_ssl, httpd.conf or ssl.conf should have the following lines:<BR>\nSSLProtocol
343
+ -ALL +SSLv3 +TLSv1<BR>\nSSLCipherSuite ALL:!aNULL:!ADH:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM<BR><BR>\nFor
344
+ Apache/apache_ssl include the following line in the configuration file (httpsd.conf):<BR>\nSSLRequireCipher
345
+ ALL:!aNULL:!ADH:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM<BR>\n<P><B>2) IIS:</B>\n<BR>For
346
+ IIS please see: <A HREF=\"http://support.microsoft.com/kb/187498/en-us\" TARGET=\"_blank\">How
347
+ to disable PCT 1.0, SSL 2.0, SSL 3.0, or TLS 1.0 in Internet Information Services</A>,
348
+ <A HREF=\"http://support.microsoft.com/kb/245030/en-us\" TARGET=\"_blank\">How
349
+ to Restrict the Use of Certain Cryptographic Algorithms and Protocols in Schannel.dll</A>,
350
+ <A HREF=\"http://support.microsoft.com/kb/299520/en-us\" TARGET=\"_blank\">How
351
+ to Determine the Cipher Suite for the Server and Client</A>, , and <A HREF=\"http://support.microsoft.com/kb/241447\"
352
+ TARGET=\"_blank\">How to restrict the use of certain ciphers in Internet Information
353
+ Services 5.0</A>\n<P>\n<B>3) Wu-FTP:</B>\nFor Wu-FTP which supports TLS, the
354
+ ciphers parameter in TLS configuration file should be set to -ALL +SSLv3 +TLSv1<BR>
355
+ For more details please consult the docs/HOWTO/ssl_and_tls_ftpd.HOWTO file
356
+ provided by wu-ftpd distribution.\n<P>\n<B>4) Lighttpd:</B>\nFor lighttpd:
357
+ Locate the lighttpd config file and modify the following ssl.ciper-list line
358
+ to include !aNULL. A restart of the lightttpd application is necessary.<BR>\nExample:
359
+ ssl.cipher-list = &quot;TLSv1+HIGH !SSLv2 RC4+MEDIUM !aNULL !eNULL !3DES @STRENGTH&quot;\n\n<P>\n<B>It
360
+ is recommended that you follow SSL best security practices:</B>\n<BR><A HREF=\"https://github.com/ssllabs/research/wiki/SSL-and-TLS-Deployment-Best-Practices\"
361
+ TARGET=\"_blank\">SSL and TLS Deployment Best Practices</A>\n<BR><A HREF=\"http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_1-1/ssl.html\"
362
+ TARGET=\"_blank\">http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_1-1/ssl.html</A>\n<BR><A
363
+ HREF=\"http://httpd.apache.org/docs/2.0/mod/mod_ssl.html#sslciphersuite\"
364
+ TARGET=\"_blank\">http://httpd.apache.org/docs/2.0/mod/mod_ssl.html#sslciphersuite</A>\n<BR><A
365
+ HREF=\"http://www.megasecurity.org/Info/ssl_servers.html\" TARGET=\"_blank\">http://www.megasecurity.org/Info/ssl_servers.html</A><P>]]></SOLUTION>\n
366
+ \ <PCI_FLAG>1</PCI_FLAG>\n <LAST_UPDATE>2017-03-17T00:12:11Z</LAST_UPDATE>\n
367
+ \ </VULN_DETAILS>\n <VULN_DETAILS id=\"qid_38169\">\n <QID
368
+ id=\"qid_38169\">38169</QID>\n <TITLE><![CDATA[SSL Certificate - Self-Signed
369
+ Certificate]]></TITLE>\n <SEVERITY>2</SEVERITY>\n <CATEGORY>General
370
+ remote services</CATEGORY>\n <THREAT><![CDATA[An SSL Certificate associates
371
+ an entity (person, organization, host, etc.) with a Public Key. In an SSL
372
+ connection, the client authenticates the remote server using the server's
373
+ Certificate and extracts the Public Key in the Certificate to establish the
374
+ secure connection.\n<P>\nThe client can trust that the Server Certificate
375
+ belongs the server only if it is signed by a mutually trusted third-party
376
+ Certificate Authority (CA). Self-signed certificates are created generally
377
+ for testing purposes or to avoid paying third-party CAs. These should not
378
+ be used on any production or critical servers.\n<P>\nBy exploiting this vulnerability,
379
+ an attacker can impersonate the server by presenting a fake self-signed certificate.
380
+ If the client knows that the server does not have a trusted certificate, it
381
+ will accept this spoofed certificate and communicate with the remote server.]]></THREAT>\n
382
+ \ <IMPACT><![CDATA[By exploiting this vulnerability, an attacker can
383
+ launch a man-in-the-middle attack.]]></IMPACT>\n <SOLUTION><![CDATA[Please
384
+ install a server certificate signed by a trusted third-party Certificate Authority.]]></SOLUTION>\n
385
+ \ <PCI_FLAG>1</PCI_FLAG>\n <LAST_UPDATE>2009-05-25T03:59:26Z</LAST_UPDATE>\n
386
+ \ </VULN_DETAILS>\n <VULN_DETAILS id=\"qid_38170\">\n <QID
387
+ id=\"qid_38170\">38170</QID>\n <TITLE><![CDATA[SSL Certificate - Subject
388
+ Common Name Does Not Match Server FQDN]]></TITLE>\n <SEVERITY>2</SEVERITY>\n
389
+ \ <CATEGORY>General remote services</CATEGORY>\n <THREAT><![CDATA[An
390
+ SSL Certificate associates an entity (person, organization, host, etc.) with
391
+ a Public Key. In an SSL connection, the client authenticates the remote server
392
+ using the server's Certificate and extracts the Public Key in the Certificate
393
+ to establish the secure connection.\n<P>\nA certificate whose Subject commonName
394
+ or subjectAltName does not match the server FQDN offers only encryption without
395
+ authentication.\n<P>\nPlease note that a false positive reporting of this
396
+ vulnerability is possible in the following case:\n<UL>If the common name of
397
+ the certificate uses a wildcard such as *.somedomainname.com and the reverse
398
+ DNS resolution of the target IP is not configured. In this case there is no
399
+ way for Qualys to associate the wildcard common name to the IP. Adding a reverse
400
+ DNS lookup entry to the target IP will solve this problem.\n</UL>]]></THREAT>\n
401
+ \ <IMPACT><![CDATA[A man-in-the-middle attacker can exploit this vulnerability
402
+ in tandem with a DNS cache poisoning attack to lure the client to another
403
+ server, and then steal all the encryption communication.]]></IMPACT>\n <SOLUTION><![CDATA[Please
404
+ install a server certificate whose Subject commonName or subjectAltName matches
405
+ the server FQDN.]]></SOLUTION>\n <PCI_FLAG>0</PCI_FLAG>\n <LAST_UPDATE>2015-08-12T17:39:01Z</LAST_UPDATE>\n
406
+ \ </VULN_DETAILS>\n <VULN_DETAILS id=\"qid_38173\">\n <QID
407
+ id=\"qid_38173\">38173</QID>\n <TITLE><![CDATA[SSL Certificate - Signature
408
+ Verification Failed Vulnerability]]></TITLE>\n <SEVERITY>2</SEVERITY>\n
409
+ \ <CATEGORY>General remote services</CATEGORY>\n <THREAT><![CDATA[An
410
+ SSL Certificate associates an entity (person, organization, host, etc.) with
411
+ a Public Key. In an SSL connection, the client authenticates the remote server
412
+ using the server's Certificate and extracts the Public Key in the Certificate
413
+ to establish the secure connection. The authentication is done by verifying
414
+ that the public key in the certificate is signed by a trusted third-party
415
+ Certificate Authority.\n<P>\nIf a client is unable to verify the certificate,
416
+ it can abort communication or prompt the user to continue the communication
417
+ without authentication.]]></THREAT>\n <IMPACT><![CDATA[By exploiting
418
+ this vulnerability, man-in-the-middle attacks in tandem with DNS cache poisoning
419
+ can occur.\n<P>\nException:<BR>\nIf the server communicates only with a restricted
420
+ set of clients who have the server certificate or the trusted CA certificate,
421
+ then the server or CA certificate may not be available publicly, and the scan
422
+ will be unable to verify the signature.]]></IMPACT>\n <SOLUTION><![CDATA[Please
423
+ install a server certificate signed by a trusted third-party Certificate Authority.]]></SOLUTION>\n
424
+ \ <PCI_FLAG>1</PCI_FLAG>\n <LAST_UPDATE>2009-05-23T00:02:29Z</LAST_UPDATE>\n
425
+ \ </VULN_DETAILS>\n <VULN_DETAILS id=\"qid_38601\">\n <QID
426
+ id=\"qid_38601\">38601</QID>\n <TITLE><![CDATA[SSL/TLS use of weak
427
+ RC4 cipher]]></TITLE>\n <SEVERITY>3</SEVERITY>\n <CATEGORY>General
428
+ remote services</CATEGORY>\n <THREAT><![CDATA[Secure Sockets Layer
429
+ (SSL v2/v3) and Transport Layer Security (TLS ) protocols provide integrity,
430
+ confidentiality and authenticity services to other protocols that lack these
431
+ features.\n<P>\nSSL/TLS protocols use ciphers such as AES,DES, 3DES and RC4
432
+ to encrypt the content of the higher layer protocols and thus provide the
433
+ confidentiality service. Normally the output of an encryption process is a
434
+ sequence of random looking bytes. It was known that RC4 output has some bias
435
+ in the output. Recently a group of researchers has discovered that the there
436
+ is a stronger bias in RC4, which make statistical analysis of ciphertext more
437
+ practical.\n<P>\nThe described attack is to inject a malicious javascript
438
+ into the victim's browser that would ensure that there are multiple connections
439
+ being established with a target website and the same HTTP cookie is sent multiple
440
+ times to the website in encrypted form. This provides the attacker a large
441
+ set of ciphertext samples, that can be used for statistical analysis.\n\n<P>NOTE:
442
+ On 3/12/15 NVD changed the CVSS v2 access complicity from high to medium.
443
+ As a result Qualys revised the CVSS score to 4.3 immediately. On 5/4/15 Qualys
444
+ is also revising the severity to level 3.]]></THREAT>\n <IMPACT><![CDATA[If
445
+ this attack is carried out and an HTTP cookie is recovered, then the attacker
446
+ can use the cookie to impersonate the user whose cookie was recovered.\n<P>\nThis
447
+ attack is not very practical as it requires the attacker to have access to
448
+ millions of samples of ciphertext, but there are certain assumptions that
449
+ an attacker can make to improve the chances of recovering the cleartext from
450
+ cihpertext. For examples HTTP cookies are either base64 encoded or hex digits.
451
+ This information can help the attacker in their efforts to recover the cookie.]]></IMPACT>\n
452
+ \ <SOLUTION><![CDATA[RC4 should not be used where possible. One reason
453
+ that RC4 was still being used was BEAST and Lucky13 attacks against CBC mode
454
+ ciphers in SSL and TLS. However, TLSv 1.2 or later address these issues.]]></SOLUTION>\n
455
+ \ <PCI_FLAG>0</PCI_FLAG>\n <LAST_UPDATE>2016-01-29T19:32:26Z</LAST_UPDATE>\n
456
+ \ <CVE_ID_LIST>\n <CVE_ID>\n <ID><![CDATA[CVE-2013-2566]]></ID>\n
457
+ \ <URL><![CDATA[http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2566]]></URL>\n
458
+ \ </CVE_ID>\n <CVE_ID>\n <ID><![CDATA[CVE-2015-2808]]></ID>\n
459
+ \ <URL><![CDATA[http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808]]></URL>\n
460
+ \ </CVE_ID>\n </CVE_ID_LIST>\n <BUGTRAQ_ID_LIST>\n <BUGTRAQ_ID>\n
461
+ \ <ID><![CDATA[91787]]></ID>\n <URL><![CDATA[http://www.securityfocus.com/bid/91787]]></URL>\n
462
+ \ </BUGTRAQ_ID>\n <BUGTRAQ_ID>\n <ID><![CDATA[58796]]></ID>\n
463
+ \ <URL><![CDATA[http://www.securityfocus.com/bid/58796]]></URL>\n
464
+ \ </BUGTRAQ_ID>\n <BUGTRAQ_ID>\n <ID><![CDATA[73684]]></ID>\n
465
+ \ <URL><![CDATA[http://www.securityfocus.com/bid/73684]]></URL>\n
466
+ \ </BUGTRAQ_ID>\n </BUGTRAQ_ID_LIST>\n </VULN_DETAILS>\n
467
+ \ <VULN_DETAILS id=\"qid_38603\">\n <QID id=\"qid_38603\">38603</QID>\n
468
+ \ <TITLE><![CDATA[SSLv3 Padding Oracle Attack Information Disclosure
469
+ Vulnerability (POODLE)]]></TITLE>\n <SEVERITY>3</SEVERITY>\n <CATEGORY>General
470
+ remote services</CATEGORY>\n <THREAT><![CDATA[The SSL protocol 3.0
471
+ design error, uses nondeterministic CBC padding, which makes it easier for
472
+ man-in-the-middle attacks. \n<P>\nThe target supports SSLv3, which makes it
473
+ vulnerable to POODLE (Padding Oracle On Downgraded Legacy Encryption), even
474
+ if it also supports more recent versions of TLS. It's subject to a downgrade
475
+ attack, in which the attacker tricks the browser into connecting with SSLv3.]]></THREAT>\n
476
+ \ <IMPACT><![CDATA[An attacker who can take a man-in-the-middle (MitM)
477
+ position can exploit this vulnerability and gain access to encrypted communication
478
+ between a client and server.]]></IMPACT>\n <SOLUTION><![CDATA[Disable
479
+ SSLv3 support to avoid this vulnerability.<P>\nExamples to disable SSLv3.<BR>\nnginx:
480
+ list specific allowed protocols in the &quot;ssl_protocols&quot; line. Make
481
+ sure SSLv2 and SSLv3 is not listed. For example: ssl_protocols TLSv2 TLSv1.1
482
+ TLSv1.2;<BR>\nApache: Add -SSLv3 to the &quot;SSLProtocol&quot; line. <BR>\n<A
483
+ HREF=\"https://support.microsoft.com/kb/187498/en-us\" TARGET=\"_blank\">How
484
+ to disable SSL 3.0 on Microsoft IIS</A>.\n<P>For PCI, please refer to the
485
+ Qualys <A HREF=\"https://community.qualys.com/thread/15280\" TARGET=\"_blank\">community
486
+ article</A>.]]></SOLUTION>\n <CORRELATION>\n <EXPLOITABILITY>\n
487
+ \ <EXPLT_SRC>\n <SRC_NAME><![CDATA[Metasploit]]></SRC_NAME>\n
488
+ \ <EXPLT_LIST>\n <EXPLT>\n <REF><![CDATA[CVE-2014-3566]]></REF>\n
489
+ \ <DESC><![CDATA[HTTP SSL/TLS Version Detection (POODLE scanner)
490
+ - Metasploit Ref : /modules/auxiliary/scanner/http/ssl_version]]></DESC>\n
491
+ \ <LINK><![CDATA[https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/ssl_version.rb]]></LINK>\n
492
+ \ </EXPLT>\n </EXPLT_LIST>\n </EXPLT_SRC>\n
493
+ \ </EXPLOITABILITY>\n </CORRELATION>\n <PCI_FLAG>1</PCI_FLAG>\n
494
+ \ <LAST_UPDATE>2016-01-06T21:57:28Z</LAST_UPDATE>\n <VENDOR_REFERENCE_LIST>\n
495
+ \ <VENDOR_REFERENCE>\n <ID><![CDATA[POODLE]]></ID>\n <URL><![CDATA[https://www.openssl.org/~bodo/ssl-poodle.pdf]]></URL>\n
496
+ \ </VENDOR_REFERENCE>\n </VENDOR_REFERENCE_LIST>\n <CVE_ID_LIST>\n
497
+ \ <CVE_ID>\n <ID><![CDATA[CVE-2014-3566]]></ID>\n <URL><![CDATA[http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566]]></URL>\n
498
+ \ </CVE_ID>\n </CVE_ID_LIST>\n <BUGTRAQ_ID_LIST>\n <BUGTRAQ_ID>\n
499
+ \ <ID><![CDATA[70574]]></ID>\n <URL><![CDATA[http://www.securityfocus.com/bid/70574]]></URL>\n
500
+ \ </BUGTRAQ_ID>\n </BUGTRAQ_ID_LIST>\n </VULN_DETAILS>\n
501
+ \ <VULN_DETAILS id=\"qid_38606\">\n <QID id=\"qid_38606\">38606</QID>\n
502
+ \ <TITLE><![CDATA[SSL Server Has SSLv3 Enabled Vulnerability]]></TITLE>\n
503
+ \ <SEVERITY>3</SEVERITY>\n <CATEGORY>General remote services</CATEGORY>\n
504
+ \ <THREAT><![CDATA[SSL 3.0 is an obsolete and insecure protocol.<BR>\nEncryption
505
+ in SSL 3.0 uses either the RC4 stream cipher, or a block cipher in CBC mode.<BR>\nRC4
506
+ is known to have biases, and the block cipher in CBC mode is vulnerable to
507
+ the POODLE attack.<P>\n\nThe SSLv3 protocol is insecure due to the POODLE
508
+ attack and the weakness of RC4 cipher.<P>\nNote: In April 2016, PCI released
509
+ <A HREF=\"https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-2.pdf\"
510
+ TARGET=\"_blank\">PCI DSS v3.2</A> announcing that NIST no longer considers
511
+ Secure Socket Layers (SSL) v3.0 protocol as acceptable for protecting data
512
+ and that all versions of SSL versions do not meet the PCI definition of &quot;strong
513
+ cryptography.&quot;<P>]]></THREAT>\n <IMPACT><![CDATA[An attacker can
514
+ exploit this vulnerability to read secure communications or maliciously modify
515
+ messages.]]></IMPACT>\n <SOLUTION><![CDATA[Disable the SSL 3.0 protocol
516
+ in the client and in the server, refer to \nHow to disable SSLv3 : <A HREF=\"http://disablessl3.com/\"
517
+ TARGET=\"_blank\">Disable SSLv3</A>]]></SOLUTION>\n <PCI_FLAG>1</PCI_FLAG>\n
518
+ \ <LAST_UPDATE>2017-07-10T18:08:39Z</LAST_UPDATE>\n </VULN_DETAILS>\n
519
+ \ <VULN_DETAILS id=\"qid_38628\">\n <QID id=\"qid_38628\">38628</QID>\n
520
+ \ <TITLE><![CDATA[SSL/TLS Server supports TLSv1.0]]></TITLE>\n <SEVERITY>3</SEVERITY>\n
521
+ \ <CATEGORY>General remote services</CATEGORY>\n <THREAT><![CDATA[TLS
522
+ is capable of using a multitude of ciphers (algorithms) to create the public
523
+ and private key pairs.<BR>\nFor example if TLSv1.0 uses either the RC4 stream
524
+ cipher, or a block cipher in CBC mode.<BR>\nRC4 is known to have biases and
525
+ the block cipher in CBC mode is vulnerable to the POODLE attack.<P>\n\nTLSv1.0,
526
+ if configured to use the same cipher suites as SSLv3, includes a means by
527
+ which a TLS implementation can downgrade the connection to SSL v3.0, thus
528
+ weakening security.<P>\n\n<A HREF=\"https://blog.qualys.com/ssllabs/2014/12/08/poodle-bites-tls\"
529
+ TARGET=\"_blank\">A POODLE-type</A> attack could also be launched directly
530
+ at TLS without negotiating a downgrade.<P>\n\n<B> This QID will be marked
531
+ as a Fail for PCI as of May 1st, 2017 in accordance with the new standards.
532
+ \ For existing implementations, Merchants will be able to submit a PCI False
533
+ Positive / Exception Request and provide proof of their Risk Mitigation and
534
+ Migration Plan, which will result in a pass for PCI up until June 30th, 2018.\n<P>\n
535
+ Further details can be found at: <A HREF=\"https://community.qualys.com/message/34120\"
536
+ TARGET=\"_blank\">NEW PCI DSS v3.2 and Migrating from SSL and Early TLS v1.1</A>\n</B>\n<P>]]></THREAT>\n
537
+ \ <IMPACT><![CDATA[An attacker can exploit cryptographic flaws to conduct
538
+ man-in-the-middle type attacks or to decryption communications.<P>\nFor example:
539
+ An attacker could force a downgrade from the TLS protocol to the older SSLv3.0
540
+ protocol and exploit the POODLE vulnerability, read secure communications
541
+ or maliciously modify messages.<P>\n<A HREF=\"https://blog.qualys.com/ssllabs/2014/12/08/poodle-bites-tls\"
542
+ TARGET=\"_blank\">A POODLE-type</A> attack could also be launched directly
543
+ at TLS without negotiating a downgrade.<P>]]></IMPACT>\n <SOLUTION><![CDATA[Disable
544
+ the use of TLSv1.0 protocol in favor of a cryptographically stronger protocol
545
+ such as TLSv1.2.\nThe following openssl commands can be used to do a manual
546
+ test:\nopenssl s_client -connect ip:port -tls1\n\nIf the test is successful,
547
+ then the target support TLSv1]]></SOLUTION>\n <PCI_FLAG>1</PCI_FLAG>\n
548
+ \ <LAST_UPDATE>2017-06-09T18:16:07Z</LAST_UPDATE>\n </VULN_DETAILS>\n
549
+ \ <VULN_DETAILS id=\"qid_38657\">\n <QID id=\"qid_38657\">38657</QID>\n
550
+ \ <TITLE><![CDATA[Birthday attacks against TLS ciphers with 64bit block
551
+ size vulnerability (Sweet32)]]></TITLE>\n <SEVERITY>3</SEVERITY>\n
552
+ \ <CATEGORY>General remote services</CATEGORY>\n <THREAT><![CDATA[Legacy
553
+ block ciphers having block size of 64 bits are vulnerable to a practical collision
554
+ attack when used in CBC mode. \nAll versions of SSL/TLS protocol support cipher
555
+ suites which use DES or 3DES as the symmetric encryption cipher are affected.]]></THREAT>\n
556
+ \ <IMPACT><![CDATA[Remote attackers can obtain cleartext data via a
557
+ birthday attack against a long-duration encrypted session.]]></IMPACT>\n <SOLUTION><![CDATA[Disable
558
+ and stop using DES and 3DES ciphers.\nThe following openssl commands can be
559
+ used to do a manual test:\nopenssl s_client -connect ip:port -cipher &quot;DES:3DES&quot;
560
+ -ssl2\nopenssl s_client -connect ip:port -cipher &quot;DES:3DES&quot; -ssl3\nopenssl
561
+ s_client -connect ip:port -cipher &quot;DES:3DES&quot; -tls1\nopenssl s_client
562
+ -connect ip:port -cipher &quot;DES:3DES&quot; -tls1_1\nopenssl s_client -connect
563
+ ip:port -cipher &quot;DES:3DES&quot; -tls1_2\n\nIf any of these tests is successful,
564
+ then the target is vulnerable to Sweet32.]]></SOLUTION>\n <PCI_FLAG>0</PCI_FLAG>\n
565
+ \ <LAST_UPDATE>2017-06-27T06:14:43Z</LAST_UPDATE>\n <CVE_ID_LIST>\n
566
+ \ <CVE_ID>\n <ID><![CDATA[CVE-2016-2183]]></ID>\n <URL><![CDATA[http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183]]></URL>\n
567
+ \ </CVE_ID>\n </CVE_ID_LIST>\n <BUGTRAQ_ID_LIST>\n <BUGTRAQ_ID>\n
568
+ \ <ID><![CDATA[92630]]></ID>\n <URL><![CDATA[http://www.securityfocus.com/bid/92630]]></URL>\n
569
+ \ </BUGTRAQ_ID>\n <BUGTRAQ_ID>\n <ID><![CDATA[95568]]></ID>\n
570
+ \ <URL><![CDATA[http://www.securityfocus.com/bid/95568]]></URL>\n
571
+ \ </BUGTRAQ_ID>\n </BUGTRAQ_ID_LIST>\n </VULN_DETAILS>\n
572
+ \ <VULN_DETAILS id=\"qid_38685\">\n <QID id=\"qid_38685\">38685</QID>\n
573
+ \ <TITLE><![CDATA[SSL Certificate - Invalid Maximum Validity Date Detected]]></TITLE>\n
574
+ \ <SEVERITY>2</SEVERITY>\n <CATEGORY>General remote services</CATEGORY>\n
575
+ \ <THREAT><![CDATA[Starting 1 April 2015, Certification Authorities
576
+ (CAs) are not permitted to issue SSL certificates (issued from a public root)
577
+ with a validity period greater than 39 months. \n<BR>\nSSL/TLS certificate
578
+ maximum validity is three years (39 months) for Domain Validated (DV) and
579
+ Organization Validated (OV) Certificates.<BR>\nSSL certificates have limited
580
+ validity periods so that the certificate's holder identity information is
581
+ re-authenticated more frequently. \n<P>\nIt is detected that maximum validity
582
+ of certificate on the system is more than what is recommended.]]></THREAT>\n
583
+ \ <IMPACT><![CDATA[By exploiting this vulnerability, an attacker can
584
+ launch a man-in-the-middle attack.]]></IMPACT>\n <SOLUTION><![CDATA[Please
585
+ install a server certificate with recommended maximum validity.]]></SOLUTION>\n
586
+ \ <PCI_FLAG>1</PCI_FLAG>\n <LAST_UPDATE>2017-10-02T22:32:24Z</LAST_UPDATE>\n
587
+ \ </VULN_DETAILS>\n <VULN_DETAILS id=\"qid_82003\">\n <QID
588
+ id=\"qid_82003\">82003</QID>\n <TITLE><![CDATA[ICMP Timestamp Request]]></TITLE>\n
589
+ \ <SEVERITY>1</SEVERITY>\n <CATEGORY>TCP/IP</CATEGORY>\n <THREAT><![CDATA[ICMP
590
+ (Internet Control and Error Message Protocol) is a protocol encapsulated in
591
+ IP packets. It's principal purpose is to provide a protocol layer able to
592
+ inform gateways of the inter-connectivity and accessibility of other gateways
593
+ or hosts. &quot;ping&quot; is a well-known program for determining if a host
594
+ is up or down. It uses ICMP echo packets. ICMP timestamp packets are used
595
+ to synchronize clocks between hosts.]]></THREAT>\n <IMPACT><![CDATA[Unauthorized
596
+ users can obtain information about your network by sending ICMP timestamp
597
+ packets. For example, the internal systems clock should not be disclosed since
598
+ some internal daemons use this value to calculate ID or sequence numbers (i.e.,
599
+ on SunOS servers).]]></IMPACT>\n <SOLUTION><![CDATA[You can filter
600
+ ICMP messages of type &quot;Timestamp&quot; and &quot;Timestamp Reply&quot;
601
+ at the firewall level. Some system administrators choose to filter most types
602
+ of ICMP messages for various reasons. For example, they may want to protect
603
+ their internal hosts from ICMP-based Denial Of Service attacks, such as the
604
+ <I>Ping of Death</I> or <I>Smurf</I> attacks. \n<P>\nHowever, you should never
605
+ filter <B>ALL</B> ICMP messages, as some of them (&quot;Don't Fragment&quot;,
606
+ &quot;Destination Unreachable&quot;, &quot;Source Quench&quot;, etc) are necessary
607
+ for proper behavior of Operating System TCP/IP stacks.\n<P>\nIt may be wiser
608
+ to contact your network consultants for advice, since this issue impacts your
609
+ overall network reliability and security.]]></SOLUTION>\n <PCI_FLAG>0</PCI_FLAG>\n
610
+ \ <LAST_UPDATE>2009-04-29T03:59:17Z</LAST_UPDATE>\n <CVE_ID_LIST>\n
611
+ \ <CVE_ID>\n <ID><![CDATA[CVE-1999-0524]]></ID>\n <URL><![CDATA[http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0524]]></URL>\n
612
+ \ </CVE_ID>\n </CVE_ID_LIST>\n </VULN_DETAILS>\n </VULN_DETAILS_LIST>\n
613
+ \ </GLOSSARY>\n <APPENDICES>\n <NO_VULNS>\n <IP_LIST>\n <RANGE>\n
614
+ \ <START>192.168.1.100</START>\n <END>192.168.1.100</END>\n
615
+ \ </RANGE>\n </IP_LIST>\n </NO_VULNS>\n <TEMPLATE_DETAILS>\n
616
+ \ <FILTER_SUMMARY>\n Status:New, Active, Re-Opened, Fixed\n Vulnerabilities:\n
617
+ \ State:Active\n Included Operating Systems:\n All Operating
618
+ Systems\n </FILTER_SUMMARY>\n </TEMPLATE_DETAILS>\n </APPENDICES>\n</ASSET_DATA_REPORT>\n<!--
619
+ CONFIDENTIAL AND PROPRIETARY INFORMATION. Qualys provides the QualysGuard
620
+ Service \"As Is,\" without any warranty of any kind. Qualys makes no warranty
621
+ that the information contained in this report is complete or error-free. Copyright
622
+ 2017, Qualys, Inc. //--> \n"
623
+ http_version:
624
+ recorded_at: Tue, 12 Dec 2017 10:00:00 GMT
625
+ recorded_with: VCR 4.0.0