qualys 0.1.4 → 0.1.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (44) hide show
  1. checksums.yaml +4 -4
  2. data/.gitignore +3 -2
  3. data/.rubocop.yml +7 -0
  4. data/.rubocop_todo.yml +71 -0
  5. data/.travis.yml +13 -1
  6. data/Gemfile +3 -1
  7. data/Gemfile.lock +91 -0
  8. data/README.md +50 -10
  9. data/Rakefile +3 -4
  10. data/lib/qualys.rb +10 -11
  11. data/lib/qualys/api.rb +38 -47
  12. data/lib/qualys/auth.rb +11 -20
  13. data/lib/qualys/compliance.rb +3 -7
  14. data/lib/qualys/config.rb +3 -5
  15. data/lib/qualys/host.rb +17 -0
  16. data/lib/qualys/report.rb +90 -0
  17. data/lib/qualys/scans.rb +10 -22
  18. data/lib/qualys/version.rb +1 -1
  19. data/lib/qualys/vulnerability.rb +74 -0
  20. data/qualys.gemspec +18 -19
  21. data/spec/fixtures/vcr_cassettes/api_get.yml +52 -0
  22. data/spec/fixtures/vcr_cassettes/create_global_report.yml +68 -0
  23. data/spec/fixtures/vcr_cassettes/emptyscans.yml +35 -0
  24. data/spec/fixtures/vcr_cassettes/get.yml +107 -0
  25. data/spec/fixtures/vcr_cassettes/global_report.yml +17800 -0
  26. data/spec/fixtures/vcr_cassettes/load_global_report.yml +625 -0
  27. data/spec/fixtures/vcr_cassettes/login.yml +50 -0
  28. data/spec/fixtures/vcr_cassettes/logout.yml +50 -0
  29. data/spec/fixtures/vcr_cassettes/scan.yml +73 -0
  30. data/spec/fixtures/vcr_cassettes/scans.yml +89 -0
  31. data/spec/fixtures/vcr_cassettes/templates.yml +121 -0
  32. data/spec/fixtures/vcr_cassettes/try_load_not_existing_report.yml +63 -0
  33. data/spec/fixtures/vcr_cassettes/unlogged.yml +45 -0
  34. data/spec/fixtures/vcr_cassettes/wrong.yml +101 -0
  35. data/spec/qualys/api_spec.rb +27 -0
  36. data/spec/qualys/report_spec.rb +65 -0
  37. data/spec/qualys/scans_spec.rb +75 -0
  38. data/spec/qualys/version_spec.rb +11 -0
  39. data/spec/qualys/vulnerability_spec.rb +53 -0
  40. data/spec/qualys_spec.rb +20 -0
  41. data/spec/spec_helper.rb +37 -0
  42. metadata +61 -15
  43. data/.rock.yml +0 -17
  44. data/lib/qualys/reports.rb +0 -47
@@ -0,0 +1,625 @@
1
+ ---
2
+ http_interactions:
3
+ - request:
4
+ method: get
5
+ uri: https://qualysapi.qualys.eu/api/2.0/fo/report/?action=fetch&id=4888430
6
+ body:
7
+ encoding: US-ASCII
8
+ string: ''
9
+ headers:
10
+ X-Requested-With:
11
+ - Qualys Ruby Client v0.1.3
12
+ response:
13
+ status:
14
+ code: 200
15
+ message: OK
16
+ headers:
17
+ Date:
18
+ - Tue, 12 Dec 2017 10:00:00 GMT
19
+ Server:
20
+ - Qualys
21
+ X-Xss-Protection:
22
+ - '1'
23
+ X-Content-Type-Options:
24
+ - nosniff
25
+ X-Frame-Options:
26
+ - SAMEORIGIN
27
+ Expires:
28
+ - Thu, 19 Nov 1981 08:52:00 GMT
29
+ Cache-Control:
30
+ - ''
31
+ Pragma:
32
+ - ''
33
+ X-Ratelimit-Limit:
34
+ - '300'
35
+ X-Ratelimit-Window-Sec:
36
+ - '3600'
37
+ X-Concurrency-Limit-Limit:
38
+ - '2'
39
+ X-Concurrency-Limit-Running:
40
+ - '0'
41
+ X-Ratelimit-Towait-Sec:
42
+ - '0'
43
+ X-Ratelimit-Remaining:
44
+ - '292'
45
+ Content-Length:
46
+ - '55643'
47
+ Content-Disposition:
48
+ - attachment; filename=Scan_Report_Generated_by_Ruby_Qualys_gem_Thomas_20171212.xml
49
+ Content-Type:
50
+ - application/xml
51
+ body:
52
+ encoding: UTF-8
53
+ string: "<?xml version=\"1.0\" encoding=\"UTF-8\" ?>\n\n<!DOCTYPE ASSET_DATA_REPORT
54
+ SYSTEM \"https://qualysguard.qualys.eu/asset_data_report.dtd\">\n<ASSET_DATA_REPORT>\n
55
+ \ <HEADER>\n <COMPANY><![CDATA[ACME]]></COMPANY>\n <USERNAME>Thomas</USERNAME>\n
56
+ \ <GENERATION_DATETIME>2017-12-12T09:55:42Z</GENERATION_DATETIME>\n <TEMPLATE><![CDATA[Technical
57
+ Report]]></TEMPLATE>\n <TARGET>\n <USER_ASSET_GROUPS>\n <ASSET_GROUP_TITLE><![CDATA[All]]></ASSET_GROUP_TITLE>\n
58
+ \ </USER_ASSET_GROUPS>\n <COMBINED_IP_LIST>\n <RANGE>\n <START>47.69.112.62</START>\n
59
+ \ <END>47.69.112.62</END>\n </RANGE>\n <RANGE>\n <START>88.78.187.177</START>\n
60
+ \ <END>88.78.187.177</END>\n </RANGE>\n <RANGE>\n <START>192.168.1.100</START>\n
61
+ \ <END>192.168.1.100</END>\n </RANGE>\n </COMBINED_IP_LIST>\n
62
+ \ </TARGET>\n <RISK_SCORE_SUMMARY>\n <TOTAL_VULNERABILITIES>19</TOTAL_VULNERABILITIES>\n
63
+ \ <AVG_SECURITY_RISK>2.4</AVG_SECURITY_RISK>\n <BUSINESS_RISK>12/100</BUSINESS_RISK>\n
64
+ \ </RISK_SCORE_SUMMARY>\n </HEADER>\n <HOST_LIST>\n <HOST>\n <IP>47.69.112.62</IP>\n
65
+ \ <TRACKING_METHOD>IP</TRACKING_METHOD>\n <DNS><![CDATA[12.ip-34-56-789.ab]]></DNS>\n
66
+ \ <OPERATING_SYSTEM><![CDATA[Ubuntu / Tiny Core Linux / Linux 2.6.x]]></OPERATING_SYSTEM>\n
67
+ \ <VULN_INFO_LIST>\n <VULN_INFO>\n <QID id=\"qid_38173\">38173</QID>\n
68
+ \ <TYPE>Vuln</TYPE>\n <PORT>25</PORT>\n <SERVICE>smtp</SERVICE>\n
69
+ \ <PROTOCOL>tcp</PROTOCOL>\n <SSL>true</SSL>\n <RESULT><![CDATA[Certificate
70
+ #0 CN=localhost.localdomain self signed certificate]]></RESULT>\n <FIRST_FOUND>2017-12-07T08:12:19Z</FIRST_FOUND>\n
71
+ \ <LAST_FOUND>2017-12-07T08:12:19Z</LAST_FOUND>\n <TIMES_FOUND>1</TIMES_FOUND>\n
72
+ \ <VULN_STATUS>New</VULN_STATUS>\n </VULN_INFO>\n <VULN_INFO>\n
73
+ \ <QID id=\"qid_38685\">38685</QID>\n <TYPE>Vuln</TYPE>\n
74
+ \ <PORT>25</PORT>\n <SERVICE>smtp</SERVICE>\n <PROTOCOL>tcp</PROTOCOL>\n
75
+ \ <SSL>true</SSL>\n <RESULT><![CDATA[Certificate #0 CN=localhost.localdomain
76
+ \ is valid for more than 39 months]]></RESULT>\n <FIRST_FOUND>2017-12-07T08:12:19Z</FIRST_FOUND>\n
77
+ \ <LAST_FOUND>2017-12-07T08:12:19Z</LAST_FOUND>\n <TIMES_FOUND>1</TIMES_FOUND>\n
78
+ \ <VULN_STATUS>New</VULN_STATUS>\n </VULN_INFO>\n <VULN_INFO>\n
79
+ \ <QID id=\"qid_38169\">38169</QID>\n <TYPE>Vuln</TYPE>\n
80
+ \ <PORT>25</PORT>\n <SERVICE>smtp</SERVICE>\n <PROTOCOL>tcp</PROTOCOL>\n
81
+ \ <SSL>true</SSL>\n <RESULT><![CDATA[Certificate #0 CN=localhost.localdomain
82
+ \ is a self signed certificate.]]></RESULT>\n <FIRST_FOUND>2017-12-07T08:12:19Z</FIRST_FOUND>\n
83
+ \ <LAST_FOUND>2017-12-07T08:12:19Z</LAST_FOUND>\n <TIMES_FOUND>1</TIMES_FOUND>\n
84
+ \ <VULN_STATUS>New</VULN_STATUS>\n </VULN_INFO>\n <VULN_INFO>\n
85
+ \ <QID id=\"qid_38170\">38170</QID>\n <TYPE>Vuln</TYPE>\n
86
+ \ <PORT>25</PORT>\n <SERVICE>smtp</SERVICE>\n <PROTOCOL>tcp</PROTOCOL>\n
87
+ \ <SSL>true</SSL>\n <RESULT><![CDATA[Certificate #0 CN=localhost.localdomain
88
+ (localhost.localdomain) doesn&apos;t resolve]]></RESULT>\n <FIRST_FOUND>2017-12-07T08:12:19Z</FIRST_FOUND>\n
89
+ \ <LAST_FOUND>2017-12-07T08:12:19Z</LAST_FOUND>\n <TIMES_FOUND>1</TIMES_FOUND>\n
90
+ \ <VULN_STATUS>New</VULN_STATUS>\n </VULN_INFO>\n <VULN_INFO>\n
91
+ \ <QID id=\"qid_38628\">38628</QID>\n <TYPE>Vuln</TYPE>\n
92
+ \ <PORT>25</PORT>\n <SERVICE>smtp</SERVICE>\n <PROTOCOL>tcp</PROTOCOL>\n
93
+ \ <SSL>true</SSL>\n <RESULT><![CDATA[TLSv1.0 is supported]]></RESULT>\n
94
+ \ <FIRST_FOUND>2017-12-07T08:12:19Z</FIRST_FOUND>\n <LAST_FOUND>2017-12-07T08:12:19Z</LAST_FOUND>\n
95
+ \ <TIMES_FOUND>1</TIMES_FOUND>\n <VULN_STATUS>New</VULN_STATUS>\n
96
+ \ </VULN_INFO>\n <VULN_INFO>\n <QID id=\"qid_38601\">38601</QID>\n
97
+ \ <TYPE>Vuln</TYPE>\n <PORT>25</PORT>\n <SERVICE>smtp</SERVICE>\n
98
+ \ <PROTOCOL>tcp</PROTOCOL>\n <SSL>true</SSL>\n <RESULT
99
+ format=\"table\"><![CDATA[CIPHER\tKEY-EXCHANGE\tAUTHENTICATION\tMAC\tENCRYPTION(KEY-STRENGTH)\tGRADE\nSSLv3
100
+ WITH RC4 CIPHERs IS SUPPORTED\t \t \t \t \t \nEXP-RC4-MD5\tRSA(512)\tRSA\tMD5\tRC4(40)\tLOW\nRC4-MD5\tRSA\tRSA\tMD5\tRC4(128)\tMEDIUM\nRC4-SHA\tRSA\tRSA\tSHA1\tRC4(128)\tMEDIUM\nEXP-ADH-RC4-MD5\tDH(512)\tNone\tMD5\tRC4(40)\tLOW\nADH-RC4-MD5\tDH\tNone\tMD5\tRC4(128)\tMEDIUM\nECDHE-RSA-RC4-SHA\tECDH\tRSA\tSHA1\tRC4(128)\tMEDIUM\nAECDH-RC4-SHA\tECDH\tNone\tSHA1\tRC4(128)\tMEDIUM\nTLSv1
101
+ WITH RC4 CIPHERs IS SUPPORTED\t \t \t \t \t \nEXP-RC4-MD5\tRSA(512)\tRSA\tMD5\tRC4(40)\tLOW\nRC4-MD5\tRSA\tRSA\tMD5\tRC4(128)\tMEDIUM\nRC4-SHA\tRSA\tRSA\tSHA1\tRC4(128)\tMEDIUM\nEXP-ADH-RC4-MD5\tDH(512)\tNone\tMD5\tRC4(40)\tLOW\nADH-RC4-MD5\tDH\tNone\tMD5\tRC4(128)\tMEDIUM\nECDHE-RSA-RC4-SHA\tECDH\tRSA\tSHA1\tRC4(128)\tMEDIUM\nAECDH-RC4-SHA\tECDH\tNone\tSHA1\tRC4(128)\tMEDIUM\nTLSv1.1
102
+ WITH RC4 CIPHERs IS SUPPORTED\t \t \t \t \t \nEXP-RC4-MD5\tRSA(512)\tRSA\tMD5\tRC4(40)\tLOW\nRC4-MD5\tRSA\tRSA\tMD5\tRC4(128)\tMEDIUM\nRC4-SHA\tRSA\tRSA\tSHA1\tRC4(128)\tMEDIUM\nEXP-ADH-RC4-MD5\tDH(512)\tNone\tMD5\tRC4(40)\tLOW\nADH-RC4-MD5\tDH\tNone\tMD5\tRC4(128)\tMEDIUM\nECDHE-RSA-RC4-SHA\tECDH\tRSA\tSHA1\tRC4(128)\tMEDIUM\nAECDH-RC4-SHA\tECDH\tNone\tSHA1\tRC4(128)\tMEDIUM\nTLSv1.2
103
+ WITH RC4 CIPHERs IS SUPPORTED\t \t \t \t \t \nEXP-RC4-MD5\tRSA(512)\tRSA\tMD5\tRC4(40)\tLOW\nRC4-MD5\tRSA\tRSA\tMD5\tRC4(128)\tMEDIUM\nRC4-SHA\tRSA\tRSA\tSHA1\tRC4(128)\tMEDIUM\nEXP-ADH-RC4-MD5\tDH(512)\tNone\tMD5\tRC4(40)\tLOW\nADH-RC4-MD5\tDH\tNone\tMD5\tRC4(128)\tMEDIUM\nECDHE-RSA-RC4-SHA\tECDH\tRSA\tSHA1\tRC4(128)\tMEDIUM\nAECDH-RC4-SHA\tECDH\tNone\tSHA1\tRC4(128)\tMEDIUM]]></RESULT>\n
104
+ \ <FIRST_FOUND>2017-12-07T08:12:19Z</FIRST_FOUND>\n <LAST_FOUND>2017-12-07T08:12:19Z</LAST_FOUND>\n
105
+ \ <TIMES_FOUND>1</TIMES_FOUND>\n <VULN_STATUS>New</VULN_STATUS>\n
106
+ \ </VULN_INFO>\n <VULN_INFO>\n <QID id=\"qid_38140\">38140</QID>\n
107
+ \ <TYPE>Vuln</TYPE>\n <PORT>25</PORT>\n <SERVICE>smtp</SERVICE>\n
108
+ \ <PROTOCOL>tcp</PROTOCOL>\n <SSL>true</SSL>\n <RESULT
109
+ format=\"table\"><![CDATA[CIPHER\tKEY-EXCHANGE\tAUTHENTICATION\tMAC\tENCRYPTION(KEY-STRENGTH)\tGRADE\nSSLv3
110
+ WEAK CIPHERS\t \t \t \t \t \nEXP-RC4-MD5\tRSA(512)\tRSA\tMD5\tRC4(40)\tLOW\nEXP-RC2-CBC-MD5\tRSA(512)\tRSA\tMD5\tRC2(40)\tLOW\nEXP-DES-CBC-SHA\tRSA(512)\tRSA\tSHA1\tDES(40)\tLOW\nDES-CBC-SHA\tRSA\tRSA\tSHA1\tDES(56)\tLOW\nEXP-EDH-RSA-DES-CBC-SHA\tDH(512)\tRSA\tSHA1\tDES(40)\tLOW\nEDH-RSA-DES-CBC-SHA\tDH\tRSA\tSHA1\tDES(56)\tLOW\nEXP-ADH-RC4-MD5\tDH(512)\tNone\tMD5\tRC4(40)\tLOW\nEXP-ADH-DES-CBC-SHA\tDH(512)\tNone\tSHA1\tDES(40)\tLOW\nADH-DES-CBC-SHA\tDH\tNone\tSHA1\tDES(56)\tLOW\nTLSv1
111
+ WEAK CIPHERS\t \t \t \t \t \nEXP-RC4-MD5\tRSA(512)\tRSA\tMD5\tRC4(40)\tLOW\nEXP-RC2-CBC-MD5\tRSA(512)\tRSA\tMD5\tRC2(40)\tLOW\nEXP-DES-CBC-SHA\tRSA(512)\tRSA\tSHA1\tDES(40)\tLOW\nDES-CBC-SHA\tRSA\tRSA\tSHA1\tDES(56)\tLOW\nEXP-EDH-RSA-DES-CBC-SHA\tDH(512)\tRSA\tSHA1\tDES(40)\tLOW\nEDH-RSA-DES-CBC-SHA\tDH\tRSA\tSHA1\tDES(56)\tLOW\nEXP-ADH-RC4-MD5\tDH(512)\tNone\tMD5\tRC4(40)\tLOW\nEXP-ADH-DES-CBC-SHA\tDH(512)\tNone\tSHA1\tDES(40)\tLOW\nADH-DES-CBC-SHA\tDH\tNone\tSHA1\tDES(56)\tLOW\nTLSv1.1
112
+ WEAK CIPHERS\t \t \t \t \t \nEXP-RC4-MD5\tRSA(512)\tRSA\tMD5\tRC4(40)\tLOW\nEXP-RC2-CBC-MD5\tRSA(512)\tRSA\tMD5\tRC2(40)\tLOW\nEXP-DES-CBC-SHA\tRSA(512)\tRSA\tSHA1\tDES(40)\tLOW\nDES-CBC-SHA\tRSA\tRSA\tSHA1\tDES(56)\tLOW\nEXP-EDH-RSA-DES-CBC-SHA\tDH(512)\tRSA\tSHA1\tDES(40)\tLOW\nEDH-RSA-DES-CBC-SHA\tDH\tRSA\tSHA1\tDES(56)\tLOW\nEXP-ADH-RC4-MD5\tDH(512)\tNone\tMD5\tRC4(40)\tLOW\nEXP-ADH-DES-CBC-SHA\tDH(512)\tNone\tSHA1\tDES(40)\tLOW\nADH-DES-CBC-SHA\tDH\tNone\tSHA1\tDES(56)\tLOW\nTLSv1.2
113
+ WEAK CIPHERS\t \t \t \t \t \nEXP-RC4-MD5\tRSA(512)\tRSA\tMD5\tRC4(40)\tLOW\nEXP-RC2-CBC-MD5\tRSA(512)\tRSA\tMD5\tRC2(40)\tLOW\nEXP-DES-CBC-SHA\tRSA(512)\tRSA\tSHA1\tDES(40)\tLOW\nDES-CBC-SHA\tRSA\tRSA\tSHA1\tDES(56)\tLOW\nEXP-EDH-RSA-DES-CBC-SHA\tDH(512)\tRSA\tSHA1\tDES(40)\tLOW\nEDH-RSA-DES-CBC-SHA\tDH\tRSA\tSHA1\tDES(56)\tLOW\nEXP-ADH-RC4-MD5\tDH(512)\tNone\tMD5\tRC4(40)\tLOW\nEXP-ADH-DES-CBC-SHA\tDH(512)\tNone\tSHA1\tDES(40)\tLOW\nADH-DES-CBC-SHA\tDH\tNone\tSHA1\tDES(56)\tLOW]]></RESULT>\n
114
+ \ <FIRST_FOUND>2017-12-07T08:12:19Z</FIRST_FOUND>\n <LAST_FOUND>2017-12-07T08:12:19Z</LAST_FOUND>\n
115
+ \ <TIMES_FOUND>1</TIMES_FOUND>\n <VULN_STATUS>New</VULN_STATUS>\n
116
+ \ </VULN_INFO>\n <VULN_INFO>\n <QID id=\"qid_38142\">38142</QID>\n
117
+ \ <TYPE>Vuln</TYPE>\n <PORT>25</PORT>\n <SERVICE>smtp</SERVICE>\n
118
+ \ <PROTOCOL>tcp</PROTOCOL>\n <SSL>true</SSL>\n <RESULT
119
+ format=\"table\"><![CDATA[CIPHER\tKEY-EXCHANGE\tAUTHENTICATION\tMAC\tENCRYPTION(KEY-STRENGTH)\tGRADE\nSSLv3
120
+ SUPPORTS CIPHERS WITH NO AUTHENTICATION\t \t \t \t \t \nEXP-ADH-RC4-MD5\tDH(512)\tNone\tMD5\tRC4(40)\tLOW\nADH-RC4-MD5\tDH\tNone\tMD5\tRC4(128)\tMEDIUM\nEXP-ADH-DES-CBC-SHA\tDH(512)\tNone\tSHA1\tDES(40)\tLOW\nADH-DES-CBC-SHA\tDH\tNone\tSHA1\tDES(56)\tLOW\nADH-DES-CBC3-SHA\tDH\tNone\tSHA1\t3DES(168)\tMEDIUM\nADH-AES128-SHA\tDH\tNone\tSHA1\tAES(128)\tMEDIUM\nADH-AES256-SHA\tDH\tNone\tSHA1\tAES(256)\tHIGH\nADH-CAMELLIA128-SHA\tDH\tNone\tSHA1\tCamellia(128)\tMEDIUM\nADH-CAMELLIA256-SHA\tDH\tNone\tSHA1\tCamellia(256)\tHIGH\nADH-SEED-SHA\tDH\tNone\tSHA1\tSEED(128)\tMEDIUM\nAECDH-RC4-SHA\tECDH\tNone\tSHA1\tRC4(128)\tMEDIUM\nAECDH-DES-CBC3-SHA\tECDH\tNone\tSHA1\t3DES(168)\tMEDIUM\nAECDH-AES128-SHA\tECDH\tNone\tSHA1\tAES(128)\tMEDIUM\nAECDH-AES256-SHA\tECDH\tNone\tSHA1\tAES(256)\tHIGH\nTLSv1
121
+ SUPPORTS CIPHERS WITH NO AUTHENTICATION\t \t \t \t \t \nEXP-ADH-RC4-MD5\tDH(512)\tNone\tMD5\tRC4(40)\tLOW\nADH-RC4-MD5\tDH\tNone\tMD5\tRC4(128)\tMEDIUM\nEXP-ADH-DES-CBC-SHA\tDH(512)\tNone\tSHA1\tDES(40)\tLOW\nADH-DES-CBC-SHA\tDH\tNone\tSHA1\tDES(56)\tLOW\nADH-DES-CBC3-SHA\tDH\tNone\tSHA1\t3DES(168)\tMEDIUM\nADH-AES128-SHA\tDH\tNone\tSHA1\tAES(128)\tMEDIUM\nADH-AES256-SHA\tDH\tNone\tSHA1\tAES(256)\tHIGH\nADH-CAMELLIA128-SHA\tDH\tNone\tSHA1\tCamellia(128)\tMEDIUM\nADH-CAMELLIA256-SHA\tDH\tNone\tSHA1\tCamellia(256)\tHIGH\nADH-SEED-SHA\tDH\tNone\tSHA1\tSEED(128)\tMEDIUM\nAECDH-RC4-SHA\tECDH\tNone\tSHA1\tRC4(128)\tMEDIUM\nAECDH-DES-CBC3-SHA\tECDH\tNone\tSHA1\t3DES(168)\tMEDIUM\nAECDH-AES128-SHA\tECDH\tNone\tSHA1\tAES(128)\tMEDIUM\nAECDH-AES256-SHA\tECDH\tNone\tSHA1\tAES(256)\tHIGH\nTLSv1.1
122
+ SUPPORTS CIPHERS WITH NO AUTHENTICATION\t \t \t \t \t \nEXP-ADH-RC4-MD5\tDH(512)\tNone\tMD5\tRC4(40)\tLOW\nADH-RC4-MD5\tDH\tNone\tMD5\tRC4(128)\tMEDIUM\nEXP-ADH-DES-CBC-SHA\tDH(512)\tNone\tSHA1\tDES(40)\tLOW\nADH-DES-CBC-SHA\tDH\tNone\tSHA1\tDES(56)\tLOW\nADH-DES-CBC3-SHA\tDH\tNone\tSHA1\t3DES(168)\tMEDIUM\nADH-AES128-SHA\tDH\tNone\tSHA1\tAES(128)\tMEDIUM\nADH-AES256-SHA\tDH\tNone\tSHA1\tAES(256)\tHIGH\nADH-CAMELLIA128-SHA\tDH\tNone\tSHA1\tCamellia(128)\tMEDIUM\nADH-CAMELLIA256-SHA\tDH\tNone\tSHA1\tCamellia(256)\tHIGH\nADH-SEED-SHA\tDH\tNone\tSHA1\tSEED(128)\tMEDIUM\nAECDH-RC4-SHA\tECDH\tNone\tSHA1\tRC4(128)\tMEDIUM\nAECDH-DES-CBC3-SHA\tECDH\tNone\tSHA1\t3DES(168)\tMEDIUM\nAECDH-AES128-SHA\tECDH\tNone\tSHA1\tAES(128)\tMEDIUM\nAECDH-AES256-SHA\tECDH\tNone\tSHA1\tAES(256)\tHIGH\nTLSv1.2
123
+ SUPPORTS CIPHERS WITH NO AUTHENTICATION\t \t \t \t \t \nEXP-ADH-RC4-MD5\tDH(512)\tNone\tMD5\tRC4(40)\tLOW\nADH-RC4-MD5\tDH\tNone\tMD5\tRC4(128)\tMEDIUM\nEXP-ADH-DES-CBC-SHA\tDH(512)\tNone\tSHA1\tDES(40)\tLOW\nADH-DES-CBC-SHA\tDH\tNone\tSHA1\tDES(56)\tLOW\nADH-DES-CBC3-SHA\tDH\tNone\tSHA1\t3DES(168)\tMEDIUM\nADH-AES128-SHA\tDH\tNone\tSHA1\tAES(128)\tMEDIUM\nADH-AES256-SHA\tDH\tNone\tSHA1\tAES(256)\tHIGH\nADH-CAMELLIA128-SHA\tDH\tNone\tSHA1\tCamellia(128)\tMEDIUM\nADH-AES128-SHA256\tDH\tNone\tSHA256\tAES(128)\tMEDIUM\nADH-AES256-SHA256\tDH\tNone\tSHA256\tAES(256)\tHIGH\nADH-CAMELLIA256-SHA\tDH\tNone\tSHA1\tCamellia(256)\tHIGH\nADH-SEED-SHA\tDH\tNone\tSHA1\tSEED(128)\tMEDIUM\nADH-AES128-GCM-SHA256\tDH\tNone\tAEAD\tAESGCM(128)\tMEDIUM\nADH-AES256-GCM-SHA384\tDH\tNone\tAEAD\tAESGCM(256)\tHIGH\nAECDH-RC4-SHA\tECDH\tNone\tSHA1\tRC4(128)\tMEDIUM\nAECDH-DES-CBC3-SHA\tECDH\tNone\tSHA1\t3DES(168)\tMEDIUM\nAECDH-AES128-SHA\tECDH\tNone\tSHA1\tAES(128)\tMEDIUM\nAECDH-AES256-SHA\tECDH\tNone\tSHA1\tAES(256)\tHIGH]]></RESULT>\n
124
+ \ <FIRST_FOUND>2017-12-07T08:12:19Z</FIRST_FOUND>\n <LAST_FOUND>2017-12-07T08:12:19Z</LAST_FOUND>\n
125
+ \ <TIMES_FOUND>1</TIMES_FOUND>\n <VULN_STATUS>New</VULN_STATUS>\n
126
+ \ </VULN_INFO>\n <VULN_INFO>\n <QID id=\"qid_38657\">38657</QID>\n
127
+ \ <TYPE>Vuln</TYPE>\n <PORT>25</PORT>\n <SERVICE>smtp</SERVICE>\n
128
+ \ <PROTOCOL>tcp</PROTOCOL>\n <SSL>true</SSL>\n <RESULT
129
+ format=\"table\"><![CDATA[CIPHER\tKEY-EXCHANGE\tAUTHENTICATION\tMAC\tENCRYPTION(KEY-STRENGTH)\tGRADE\nSSLv3
130
+ WITH DES/3DES CIPHERs IS SUPPORTED\t \t \t \t \t \nEXP-DES-CBC-SHA\tRSA(512)\tRSA\tSHA1\tDES(40)\tLOW\nDES-CBC-SHA\tRSA\tRSA\tSHA1\tDES(56)\tLOW\nDES-CBC3-SHA\tRSA\tRSA\tSHA1\t3DES(168)\tMEDIUM\nEXP-EDH-RSA-DES-CBC-SHA\tDH(512)\tRSA\tSHA1\tDES(40)\tLOW\nEDH-RSA-DES-CBC-SHA\tDH\tRSA\tSHA1\tDES(56)\tLOW\nEDH-RSA-DES-CBC3-SHA\tDH\tRSA\tSHA1\t3DES(168)\tMEDIUM\nEXP-ADH-DES-CBC-SHA\tDH(512)\tNone\tSHA1\tDES(40)\tLOW\nADH-DES-CBC-SHA\tDH\tNone\tSHA1\tDES(56)\tLOW\nADH-DES-CBC3-SHA\tDH\tNone\tSHA1\t3DES(168)\tMEDIUM\nECDHE-RSA-DES-CBC3-SHA\tECDH\tRSA\tSHA1\t3DES(168)\tMEDIUM\nAECDH-DES-CBC3-SHA\tECDH\tNone\tSHA1\t3DES(168)\tMEDIUM\nTLSv1
131
+ WITH DES/3DES CIPHERs IS SUPPORTED\t \t \t \t \t \nEXP-DES-CBC-SHA\tRSA(512)\tRSA\tSHA1\tDES(40)\tLOW\nDES-CBC-SHA\tRSA\tRSA\tSHA1\tDES(56)\tLOW\nDES-CBC3-SHA\tRSA\tRSA\tSHA1\t3DES(168)\tMEDIUM\nEXP-EDH-RSA-DES-CBC-SHA\tDH(512)\tRSA\tSHA1\tDES(40)\tLOW\nEDH-RSA-DES-CBC-SHA\tDH\tRSA\tSHA1\tDES(56)\tLOW\nEDH-RSA-DES-CBC3-SHA\tDH\tRSA\tSHA1\t3DES(168)\tMEDIUM\nEXP-ADH-DES-CBC-SHA\tDH(512)\tNone\tSHA1\tDES(40)\tLOW\nADH-DES-CBC-SHA\tDH\tNone\tSHA1\tDES(56)\tLOW\nADH-DES-CBC3-SHA\tDH\tNone\tSHA1\t3DES(168)\tMEDIUM\nECDHE-RSA-DES-CBC3-SHA\tECDH\tRSA\tSHA1\t3DES(168)\tMEDIUM\nAECDH-DES-CBC3-SHA\tECDH\tNone\tSHA1\t3DES(168)\tMEDIUM\nTLSv1.1
132
+ WITH DES/3DES CIPHERs IS SUPPORTED\t \t \t \t \t \nEXP-DES-CBC-SHA\tRSA(512)\tRSA\tSHA1\tDES(40)\tLOW\nDES-CBC-SHA\tRSA\tRSA\tSHA1\tDES(56)\tLOW\nDES-CBC3-SHA\tRSA\tRSA\tSHA1\t3DES(168)\tMEDIUM\nEXP-EDH-RSA-DES-CBC-SHA\tDH(512)\tRSA\tSHA1\tDES(40)\tLOW\nEDH-RSA-DES-CBC-SHA\tDH\tRSA\tSHA1\tDES(56)\tLOW\nEDH-RSA-DES-CBC3-SHA\tDH\tRSA\tSHA1\t3DES(168)\tMEDIUM\nEXP-ADH-DES-CBC-SHA\tDH(512)\tNone\tSHA1\tDES(40)\tLOW\nADH-DES-CBC-SHA\tDH\tNone\tSHA1\tDES(56)\tLOW\nADH-DES-CBC3-SHA\tDH\tNone\tSHA1\t3DES(168)\tMEDIUM\nECDHE-RSA-DES-CBC3-SHA\tECDH\tRSA\tSHA1\t3DES(168)\tMEDIUM\nAECDH-DES-CBC3-SHA\tECDH\tNone\tSHA1\t3DES(168)\tMEDIUM\nTLSv1.2
133
+ WITH DES/3DES CIPHERs IS SUPPORTED\t \t \t \t \t \nEXP-DES-CBC-SHA\tRSA(512)\tRSA\tSHA1\tDES(40)\tLOW\nDES-CBC-SHA\tRSA\tRSA\tSHA1\tDES(56)\tLOW\nDES-CBC3-SHA\tRSA\tRSA\tSHA1\t3DES(168)\tMEDIUM\nEXP-EDH-RSA-DES-CBC-SHA\tDH(512)\tRSA\tSHA1\tDES(40)\tLOW\nEDH-RSA-DES-CBC-SHA\tDH\tRSA\tSHA1\tDES(56)\tLOW\nEDH-RSA-DES-CBC3-SHA\tDH\tRSA\tSHA1\t3DES(168)\tMEDIUM\nEXP-ADH-DES-CBC-SHA\tDH(512)\tNone\tSHA1\tDES(40)\tLOW\nADH-DES-CBC-SHA\tDH\tNone\tSHA1\tDES(56)\tLOW\nADH-DES-CBC3-SHA\tDH\tNone\tSHA1\t3DES(168)\tMEDIUM\nECDHE-RSA-DES-CBC3-SHA\tECDH\tRSA\tSHA1\t3DES(168)\tMEDIUM\nAECDH-DES-CBC3-SHA\tECDH\tNone\tSHA1\t3DES(168)\tMEDIUM]]></RESULT>\n
134
+ \ <FIRST_FOUND>2017-12-07T08:12:19Z</FIRST_FOUND>\n <LAST_FOUND>2017-12-07T08:12:19Z</LAST_FOUND>\n
135
+ \ <TIMES_FOUND>1</TIMES_FOUND>\n <VULN_STATUS>New</VULN_STATUS>\n
136
+ \ </VULN_INFO>\n <VULN_INFO>\n <QID id=\"qid_38606\">38606</QID>\n
137
+ \ <TYPE>Vuln</TYPE>\n <PORT>25</PORT>\n <SERVICE>smtp</SERVICE>\n
138
+ \ <PROTOCOL>tcp</PROTOCOL>\n <SSL>true</SSL>\n <RESULT><![CDATA[SSLv3
139
+ is supported]]></RESULT>\n <FIRST_FOUND>2017-12-07T08:12:19Z</FIRST_FOUND>\n
140
+ \ <LAST_FOUND>2017-12-07T08:12:19Z</LAST_FOUND>\n <TIMES_FOUND>1</TIMES_FOUND>\n
141
+ \ <VULN_STATUS>New</VULN_STATUS>\n </VULN_INFO>\n <VULN_INFO>\n
142
+ \ <QID id=\"qid_82003\">82003</QID>\n <TYPE>Vuln</TYPE>\n
143
+ \ <SSL>false</SSL>\n <RESULT><![CDATA[Timestamp of host (network
144
+ byte ordering): 08:05:40 GMT]]></RESULT>\n <FIRST_FOUND>2017-12-07T08:12:19Z</FIRST_FOUND>\n
145
+ \ <LAST_FOUND>2017-12-07T08:12:19Z</LAST_FOUND>\n <TIMES_FOUND>1</TIMES_FOUND>\n
146
+ \ <VULN_STATUS>New</VULN_STATUS>\n </VULN_INFO>\n <VULN_INFO>\n
147
+ \ <QID id=\"qid_38603\">38603</QID>\n <TYPE>Vuln</TYPE>\n
148
+ \ <PORT>25</PORT>\n <SERVICE>smtp</SERVICE>\n <PROTOCOL>tcp</PROTOCOL>\n
149
+ \ <SSL>false</SSL>\n <FIRST_FOUND>2017-12-07T08:12:19Z</FIRST_FOUND>\n
150
+ \ <LAST_FOUND>2017-12-07T08:12:19Z</LAST_FOUND>\n <TIMES_FOUND>1</TIMES_FOUND>\n
151
+ \ <VULN_STATUS>New</VULN_STATUS>\n </VULN_INFO>\n <VULN_INFO>\n
152
+ \ <QID id=\"qid_11827\">11827</QID>\n <TYPE>Vuln</TYPE>\n
153
+ \ <PORT>443</PORT>\n <SERVICE>http over ssl</SERVICE>\n <PROTOCOL>tcp</PROTOCOL>\n
154
+ \ <SSL>false</SSL>\n <RESULT><![CDATA[X-Frame-Options or
155
+ Content-Security-Policy: frame-ancestors HTTP Headers missing on port 443.\nGET
156
+ / HTTP/1.1\nHost: 12.ip-34-56-789.ab\nConnection: Keep-Alive\n\n\n\nX-XSS-Protection
157
+ HTTP Header missing on port 443.\nX-Content-Type-Options HTTP Header missing
158
+ on port 443.\nContent-Security-Policy HTTP Header missing on port 443.\nStrict-Transport-Security
159
+ HTTP Header missing on port 443.]]></RESULT>\n <FIRST_FOUND>2017-12-07T08:12:19Z</FIRST_FOUND>\n
160
+ \ <LAST_FOUND>2017-12-07T08:12:19Z</LAST_FOUND>\n <TIMES_FOUND>1</TIMES_FOUND>\n
161
+ \ <VULN_STATUS>New</VULN_STATUS>\n </VULN_INFO>\n <VULN_INFO>\n
162
+ \ <QID id=\"qid_11827\">11827</QID>\n <TYPE>Vuln</TYPE>\n
163
+ \ <PORT>80</PORT>\n <SERVICE>http</SERVICE>\n <PROTOCOL>tcp</PROTOCOL>\n
164
+ \ <SSL>false</SSL>\n <RESULT><![CDATA[X-Frame-Options or
165
+ Content-Security-Policy: frame-ancestors HTTP Headers missing on port 80.\nGET
166
+ / HTTP/1.1\nHost: 12.ip-34-56-789.ab\nConnection: Keep-Alive\n\n\n\nX-XSS-Protection
167
+ HTTP Header missing on port 80.\nX-Content-Type-Options HTTP Header missing
168
+ on port 80.\nContent-Security-Policy HTTP Header missing on port 80.]]></RESULT>\n
169
+ \ <FIRST_FOUND>2017-12-07T08:12:19Z</FIRST_FOUND>\n <LAST_FOUND>2017-12-07T08:12:19Z</LAST_FOUND>\n
170
+ \ <TIMES_FOUND>1</TIMES_FOUND>\n <VULN_STATUS>New</VULN_STATUS>\n
171
+ \ </VULN_INFO>\n <VULN_INFO>\n <QID id=\"qid_38628\">38628</QID>\n
172
+ \ <TYPE>Vuln</TYPE>\n <PORT>443</PORT>\n <SERVICE>http
173
+ over ssl</SERVICE>\n <PROTOCOL>tcp</PROTOCOL>\n <SSL>true</SSL>\n
174
+ \ <RESULT><![CDATA[TLSv1.0 is supported]]></RESULT>\n <FIRST_FOUND>2017-12-07T08:12:19Z</FIRST_FOUND>\n
175
+ \ <LAST_FOUND>2017-12-07T08:12:19Z</LAST_FOUND>\n <TIMES_FOUND>1</TIMES_FOUND>\n
176
+ \ <VULN_STATUS>New</VULN_STATUS>\n </VULN_INFO>\n <VULN_INFO>\n
177
+ \ <QID id=\"qid_38657\">38657</QID>\n <TYPE>Vuln</TYPE>\n
178
+ \ <PORT>443</PORT>\n <SERVICE>http over ssl</SERVICE>\n <PROTOCOL>tcp</PROTOCOL>\n
179
+ \ <SSL>true</SSL>\n <RESULT format=\"table\"><![CDATA[CIPHER\tKEY-EXCHANGE\tAUTHENTICATION\tMAC\tENCRYPTION(KEY-STRENGTH)\tGRADE\nTLSv1
180
+ WITH DES/3DES CIPHERs IS SUPPORTED\t \t \t \t \t \nDES-CBC3-SHA\tRSA\tRSA\tSHA1\t3DES(168)\tMEDIUM\nTLSv1.1
181
+ WITH DES/3DES CIPHERs IS SUPPORTED\t \t \t \t \t \nDES-CBC3-SHA\tRSA\tRSA\tSHA1\t3DES(168)\tMEDIUM\nTLSv1.2
182
+ WITH DES/3DES CIPHERs IS SUPPORTED\t \t \t \t \t \nDES-CBC3-SHA\tRSA\tRSA\tSHA1\t3DES(168)\tMEDIUM]]></RESULT>\n
183
+ \ <FIRST_FOUND>2017-12-07T08:12:19Z</FIRST_FOUND>\n <LAST_FOUND>2017-12-07T08:12:19Z</LAST_FOUND>\n
184
+ \ <TIMES_FOUND>1</TIMES_FOUND>\n <VULN_STATUS>New</VULN_STATUS>\n
185
+ \ </VULN_INFO>\n </VULN_INFO_LIST>\n </HOST>\n <HOST>\n <IP>88.78.187.177</IP>\n
186
+ \ <TRACKING_METHOD>IP</TRACKING_METHOD>\n <DNS><![CDATA[ip123.ip-45-67-891.eu]]></DNS>\n
187
+ \ <OPERATING_SYSTEM><![CDATA[Ubuntu / Fedora / Tiny Core Linux / Linux
188
+ 3.x]]></OPERATING_SYSTEM>\n <VULN_INFO_LIST>\n <VULN_INFO>\n <QID
189
+ id=\"qid_11827\">11827</QID>\n <TYPE>Vuln</TYPE>\n <PORT>80</PORT>\n
190
+ \ <SERVICE>http</SERVICE>\n <PROTOCOL>tcp</PROTOCOL>\n <SSL>false</SSL>\n
191
+ \ <RESULT><![CDATA[Content-Security-Policy HTTP Header missing on
192
+ port 80.\nGET / HTTP/1.1\nHost: ip123.ip-45-67-891.eu\nConnection: Keep-Alive]]></RESULT>\n
193
+ \ <FIRST_FOUND>2017-12-05T09:48:50Z</FIRST_FOUND>\n <LAST_FOUND>2017-12-05T09:48:50Z</LAST_FOUND>\n
194
+ \ <TIMES_FOUND>1</TIMES_FOUND>\n <VULN_STATUS>New</VULN_STATUS>\n
195
+ \ </VULN_INFO>\n <VULN_INFO>\n <QID id=\"qid_11827\">11827</QID>\n
196
+ \ <TYPE>Vuln</TYPE>\n <PORT>443</PORT>\n <SERVICE>http
197
+ over ssl</SERVICE>\n <PROTOCOL>tcp</PROTOCOL>\n <SSL>false</SSL>\n
198
+ \ <RESULT><![CDATA[Content-Security-Policy HTTP Header missing on
199
+ port 443.\nGET / HTTP/1.1\nHost: ip123.ip-45-67-891.eu\nConnection: Keep-Alive]]></RESULT>\n
200
+ \ <FIRST_FOUND>2017-12-05T09:48:50Z</FIRST_FOUND>\n <LAST_FOUND>2017-12-05T09:48:50Z</LAST_FOUND>\n
201
+ \ <TIMES_FOUND>1</TIMES_FOUND>\n <VULN_STATUS>New</VULN_STATUS>\n
202
+ \ </VULN_INFO>\n <VULN_INFO>\n <QID id=\"qid_38628\">38628</QID>\n
203
+ \ <TYPE>Vuln</TYPE>\n <PORT>443</PORT>\n <SERVICE>http
204
+ over ssl</SERVICE>\n <PROTOCOL>tcp</PROTOCOL>\n <SSL>true</SSL>\n
205
+ \ <RESULT><![CDATA[TLSv1.0 is supported]]></RESULT>\n <FIRST_FOUND>2017-12-05T09:48:50Z</FIRST_FOUND>\n
206
+ \ <LAST_FOUND>2017-12-05T09:48:50Z</LAST_FOUND>\n <TIMES_FOUND>1</TIMES_FOUND>\n
207
+ \ <VULN_STATUS>New</VULN_STATUS>\n </VULN_INFO>\n </VULN_INFO_LIST>\n
208
+ \ </HOST>\n </HOST_LIST>\n <GLOSSARY>\n <VULN_DETAILS_LIST>\n <VULN_DETAILS
209
+ id=\"qid_11827\">\n <QID id=\"qid_11827\">11827</QID>\n <TITLE><![CDATA[HTTP
210
+ Security Header Not Detected]]></TITLE>\n <SEVERITY>2</SEVERITY>\n
211
+ \ <CATEGORY>CGI</CATEGORY>\n <THREAT><![CDATA[This QID reports
212
+ the absence of the following <A HREF=\"https://www.owasp.org/index.php/OWASP_Secure_Headers_Project#tab=Headers\"
213
+ TARGET=\"_blank\">HTTP headers</A> according to <A HREF=\"https://cwe.mitre.org/data/definitions/693.html\"
214
+ TARGET=\"_blank\">CWE-693: Protection Mechanism Failure</A>:<BR>\nX-Frame-Options:
215
+ This HTTP response header improves the protection of web applications against
216
+ clickjacking attacks. Clickjacking, also known as a &quot;UI redress attack&quot;,
217
+ allows an attacker to use multiple transparent or opaque layers to trick a
218
+ targeted user into clicking on a button or link on another page when they
219
+ were intending to click on the the top level page. <BR>\nX-XSS-Protection:
220
+ This HTTP header enables the browser built-in Cross-Site Scripting (XSS) filter
221
+ to prevent cross-site scripting attacks. X-XSS-Protection: 0; disables this
222
+ functionality.<BR>\nX-Content-Type-Options: This HTTP header prevents attacks
223
+ based on MIME-type mismatch. The only possible value is nosniff. If your server
224
+ returns X-Content-Type-Options: nosniff in the response, the browser will
225
+ refuse to load the styles and scripts in case they have an incorrect MIME-type.
226
+ <BR>\nContent-Security-Policy: This HTTP header helps to detect and mitigate
227
+ certain types of attacks, including Cross Site Scripting (XSS), packet sniffing
228
+ attacks and data injection attacks.<BR>\nStrict-Transport-Security: The HTTP
229
+ Strict-Transport-Security response header (HSTS) is a security feature that
230
+ lets a web site tell browsers that it should only be communicated with using
231
+ HTTPS, instead of using HTTP.<P>\nQID Detection Logic:<BR>\nThis unauthenticated
232
+ QID looks for the presence of the following HTTP responses:<BR>\nValid directives
233
+ for X-Frame-Options are:<BR>\nX-Frame-Options: DENY - The page cannot be displayed
234
+ in a frame, regardless of the site attempting to do so.<BR>\nX-Frame-Options:
235
+ SAMEORIGIN - The page can only be displayed in a frame on the same origin
236
+ as the page itself.<BR>\nX-Frame-Options: ALLOW-FROM RESOURCE-URL - The page
237
+ can only be displayed in a frame on the specified origin.<P>\nContent-Security-Policy:
238
+ frame-ancestors - This directive specifies valid parents that may embed a
239
+ page using frame, iframe, object, embed, or applet\nValid directives for X-XSS-Protections
240
+ are:<BR>\nX-XSS-Protection: 1 - Enables XSS filtering (usually default in
241
+ browsers). If a cross-site scripting attack is detected, the browser will
242
+ sanitize the page (remove the unsafe parts).<BR>\nX-XSS-Protection: 1; mode=block
243
+ - Enables XSS filtering. Rather than sanitizing the page, the browser will
244
+ prevent rendering of the page if an attack is detected.<BR>\nX-XSS-Protection:
245
+ 1; report=URI - Enables XSS filtering. If a cross-site scripting attack is
246
+ detected, the browser will sanitize the page and report the violation. This
247
+ uses the functionality of the CSP report-uri directive to send a report.<BR>\nX-XSS-Protection:
248
+ 0 disables this directive and hence is also treated as not detected.<P>\nA
249
+ valid directive for X-Content-Type-Options: nosniff<P>\nA valid directive
250
+ for Content-Security-Policy: &lt;policy-directive&gt;; &lt;policy-directive&gt;<P>\nA
251
+ valid HSTS directive Strict-Transport-Security: max-age=&lt;expire-time&gt;;
252
+ [; includeSubDomains][; preload]<P>\n<B>NOTE:</B> All report-only directives
253
+ (where applicable) are considered invalid.]]></THREAT>\n <IMPACT><![CDATA[Depending
254
+ on the vulnerability being exploited, an unauthenticated remote attacker could
255
+ conduct cross-site scripting, clickjacking or MIME-type sniffing attacks.]]></IMPACT>\n
256
+ \ <SOLUTION><![CDATA[CWE-693: Protection Mechanism Failure mentions
257
+ the following - The product does not use or incorrectly uses a protection
258
+ mechanism that provides sufficient defense against directed attacks against
259
+ the product. A &quot;missing&quot; protection mechanism occurs when the application
260
+ does not define any mechanism against a certain class of attack. An &quot;insufficient&quot;
261
+ protection mechanism might provide some defenses - for example, against the
262
+ most common attacks - but it does not protect against everything that is intended.
263
+ Finally, an &quot;ignored&quot; mechanism occurs when a mechanism is available
264
+ and in active use within the product, but the developer has not applied it
265
+ in some code path.<P>\nCustomers are advised to set proper <A HREF=\"https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Frame-Options\"
266
+ TARGET=\"_blank\">X-Frame-Options</A>, <A HREF=\"https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-XSS-Protection\"
267
+ TARGET=\"_blank\">X-XSS-Protection</A>, <A HREF=\"https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP\"
268
+ TARGET=\"_blank\">Content Security Policy</A>, <A HREF=\"https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Content-Type-Options\"
269
+ TARGET=\"_blank\">X-Content-Type-Options</A> and <A HREF=\"https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security\"
270
+ TARGET=\"_blank\">Strict-Transport-Security</A> HTTP response headers.<P>\nDepending
271
+ on their server software, customers can set directives in their site configuration
272
+ or Web.config files. Few examples are:<P>\nX-Frame-Options:<BR>\nApache: Header
273
+ always append X-Frame-Options SAMEORIGIN<BR>\nnginx: add_header X-Frame-Options
274
+ SAMEORIGIN;<BR>\nHAProxy: rspadd X-Frame-Options:\\ SAMEORIGIN<BR>\nIIS: &lt;HTTPPROTOCOL&gt;&lt;CUSTOMHEADERS&gt;&lt;ADD
275
+ NAME=&quot;X-Frame-Options&quot; VALUE=&quot;SAMEORIGIN&quot;&gt;&lt;/ADD&gt;&lt;/CUSTOMHEADERS&gt;&lt;/HTTPPROTOCOL&gt;<P>\nX-XSS-Protection:<BR>\nApache:
276
+ Header always set X-XSS-Protection &quot;1; mode=block&quot; <BR>\nPHP: header(&quot;X-XSS-Protection:
277
+ 1; mode=block&quot;);<P>\nX-Content-Type-Options:<BR>\nApache: Header always
278
+ set X-Content-Type-Options: nosniff<P>\nContent-Security-Policy: (Please note
279
+ that these values may differ from website to website. The values below are
280
+ for informational purposes only. The scanner simply looks for the presence
281
+ of the security header.)<BR>\nApache: Header set Content-Security-Policy &quot;script-src
282
+ 'self'; object-src 'self'&quot;<BR>\nIIS: &lt;SYSTEM.WEBSERVER&gt;&lt;HTTPPROTOCOL&gt;&lt;CUSTOMHEADERS&gt;&lt;ADD
283
+ NAME=&quot;Content-Security-Policy&quot; VALUE=&quot;default-src 'self';&quot;&gt;&lt;/ADD&gt;&lt;/CUSTOMHEADERS&gt;&lt;/HTTPPROTOCOL&gt;&lt;/SYSTEM.WEBSERVER&gt;<BR>\nnginx:
284
+ add_header Content-Security-Policy &quot;default-src 'self'; script-src 'self';<P>\nHTTP
285
+ Strict-Transport-Security:<BR>\nApache: Header always set Strict-Transport-Security
286
+ &quot;max-age=31536000; includeSubDomains&quot;<BR>\nNginx: add_header Strict-Transport-Security
287
+ max-age=31536000;]]></SOLUTION>\n <PCI_FLAG>1</PCI_FLAG>\n <LAST_UPDATE>2017-11-09T00:47:11Z</LAST_UPDATE>\n
288
+ \ </VULN_DETAILS>\n <VULN_DETAILS id=\"qid_38140\">\n <QID
289
+ id=\"qid_38140\">38140</QID>\n <TITLE><![CDATA[SSL Server Supports
290
+ Weak Encryption Vulnerability]]></TITLE>\n <SEVERITY>3</SEVERITY>\n
291
+ \ <CATEGORY>General remote services</CATEGORY>\n <THREAT><![CDATA[The
292
+ Secure Socket Layer (SSL) protocol allows for secure communication between
293
+ a client and a server.\n<P>\nSSL encryption ciphers are classified based on
294
+ encryption key length as follows:<BR>\n<UL>\n<LI>HIGH - key length larger
295
+ than 128 bits\n<LI>MEDIUM - key length equal to 128 bits\n<LI>LOW - key length
296
+ smaller than 128 bits\n</UL>\n<P>\nMessages encrypted with LOW encryption
297
+ ciphers are easy to decrypt. Commercial SSL servers should only support MEDIUM
298
+ or HIGH strength ciphers to guarantee transaction security.\n<P>\nThe following
299
+ link provides more information about this vulnerability:\n<UL>\n<LI><A HREF=\"http://www.schneier.com/paper-ssl-revised.pdf\"
300
+ TARGET=\"_blank\">Analysis of the SSL 3.0 protocol</A>\n</UL>\n<P>\nPlease
301
+ note that this detection only checks for weak cipher support at the SSL layer.
302
+ Some servers may implement additional protection at the data layer. For example,
303
+ some SSL servers and SSL proxies (such as SSL accelerators) allow cipher negotiation
304
+ to complete but send back an error message and abort further communication
305
+ on the secure channel. This vulnerability may not be exploitable for such
306
+ configurations.]]></THREAT>\n <IMPACT><![CDATA[An attacker can exploit
307
+ this vulnerability to decrypt secure communications without authorization.]]></IMPACT>\n
308
+ \ <SOLUTION><![CDATA[Disable support for LOW encryption ciphers.<P>\n<B>Apache</B>\n<BR>
309
+ If TLSv1.1 or TLSv1.2 are available, then those protocols should be used.\n<BR>SSLProtocol
310
+ TLSv1.1 TLSv1.2<BR>\nIf TLSv1.1 and TLSv1.2 are not available then only TLS1.0
311
+ should be used:\n<BR>SSLProtocol TLSv1\n<BR>Typically, for Apache/mod_ssl,
312
+ httpd.conf or ssl.conf should have the following lines:<BR>\nSSLCipherSuite
313
+ ALL:!aNULL:!ADH:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM<BR><BR>\nFor Apache/apache_ssl
314
+ include the following line in the configuration file (httpsd.conf):<BR>\nSSLRequireCipher
315
+ ALL:!aNULL:!ADH:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM<BR><P>\n\n<B>Tomcat</B>\n<BR>\nsslProtocol=&quot;SSLv3&quot;
316
+ \ \n<BR>ciphers=&quot;SSL_RSA_WITH_RC4_128_MD5,SSL_RSA_WITH_RC4_128_SHA,SSL_DHE_RSA_W\n<BR>ITH_3DES_EDE_CBC_SHA&quot;\n<BR><P>\n<B>IIS</B>\n<BR>\n<A
317
+ HREF=\"http://support.microsoft.com/default.aspx?scid=kb;EN-US;245030\" TARGET=\"_blank\">How
318
+ to Restrict the Use of Certain Cryptographic Algorithms and Protocols in Schannel.dll</A>
319
+ (Windows restart required)\n<BR><A HREF=\"http://support.microsoft.com/default.aspx?scid=kb;en-us;187498\"
320
+ TARGET=\"_blank\">How to disable PCT 1.0, SSL 2.0, SSL 3.0, or TLS 1.0 in
321
+ Internet Information Services</A> (Windows restart required)\n<BR><A HREF=\"http://www.microsoft.com/technet/security/prodtech/IIS.mspx\"
322
+ TARGET=\"_blank\">Security Guidance for IIS</A>\n<P>For Novell Netware 6.5
323
+ please refer to the following document \n<A HREF=\"http://support.novell.com/cgi-bin/search/searchtid.cgi?10100633.htm\"
324
+ TARGET=\"_blank\">SSL Allows the use of Weak Ciphers. -TID10100633 </A>]]></SOLUTION>\n
325
+ \ <PCI_FLAG>1</PCI_FLAG>\n <LAST_UPDATE>2015-01-20T19:50:33Z</LAST_UPDATE>\n
326
+ \ </VULN_DETAILS>\n <VULN_DETAILS id=\"qid_38142\">\n <QID
327
+ id=\"qid_38142\">38142</QID>\n <TITLE><![CDATA[SSL Server Allows Anonymous
328
+ Authentication Vulnerability]]></TITLE>\n <SEVERITY>4</SEVERITY>\n
329
+ \ <CATEGORY>General remote services</CATEGORY>\n <THREAT><![CDATA[The
330
+ Secure Socket Layer (SSL) protocol allows for secure communication between
331
+ a client and a server. The client usually authenticates the server using an
332
+ algorithm like RSA or DSS. Some SSL ciphers allow SSL communication without
333
+ authentication. Most common Web browsers like Microsoft Internet Explorer,
334
+ Netscape and Mozilla do not use anonymous authentication ciphers by default.\n\n<P>A
335
+ vulnerability exists in SSL communications when clients are allowed to connect\nusing
336
+ no authentication algorithm. SSL client-server communication may use several
337
+ different types of\nauthentication: RSA, Diffie-Hellman, DSS or none. When
338
+ 'none' is used, the\ncommunications are vulnerable to a man-in-the-middle
339
+ attack.&quot;]]></THREAT>\n <IMPACT><![CDATA[An attacker can exploit
340
+ this vulnerability to impersonate your server to clients.]]></IMPACT>\n <SOLUTION><![CDATA[Disable
341
+ support for anonymous authentication.<P>\n<B>1) How to disable for Apache:</B>\n<BR>Typically,
342
+ for Apache/mod_ssl, httpd.conf or ssl.conf should have the following lines:<BR>\nSSLProtocol
343
+ -ALL +SSLv3 +TLSv1<BR>\nSSLCipherSuite ALL:!aNULL:!ADH:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM<BR><BR>\nFor
344
+ Apache/apache_ssl include the following line in the configuration file (httpsd.conf):<BR>\nSSLRequireCipher
345
+ ALL:!aNULL:!ADH:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM<BR>\n<P><B>2) IIS:</B>\n<BR>For
346
+ IIS please see: <A HREF=\"http://support.microsoft.com/kb/187498/en-us\" TARGET=\"_blank\">How
347
+ to disable PCT 1.0, SSL 2.0, SSL 3.0, or TLS 1.0 in Internet Information Services</A>,
348
+ <A HREF=\"http://support.microsoft.com/kb/245030/en-us\" TARGET=\"_blank\">How
349
+ to Restrict the Use of Certain Cryptographic Algorithms and Protocols in Schannel.dll</A>,
350
+ <A HREF=\"http://support.microsoft.com/kb/299520/en-us\" TARGET=\"_blank\">How
351
+ to Determine the Cipher Suite for the Server and Client</A>, , and <A HREF=\"http://support.microsoft.com/kb/241447\"
352
+ TARGET=\"_blank\">How to restrict the use of certain ciphers in Internet Information
353
+ Services 5.0</A>\n<P>\n<B>3) Wu-FTP:</B>\nFor Wu-FTP which supports TLS, the
354
+ ciphers parameter in TLS configuration file should be set to -ALL +SSLv3 +TLSv1<BR>
355
+ For more details please consult the docs/HOWTO/ssl_and_tls_ftpd.HOWTO file
356
+ provided by wu-ftpd distribution.\n<P>\n<B>4) Lighttpd:</B>\nFor lighttpd:
357
+ Locate the lighttpd config file and modify the following ssl.ciper-list line
358
+ to include !aNULL. A restart of the lightttpd application is necessary.<BR>\nExample:
359
+ ssl.cipher-list = &quot;TLSv1+HIGH !SSLv2 RC4+MEDIUM !aNULL !eNULL !3DES @STRENGTH&quot;\n\n<P>\n<B>It
360
+ is recommended that you follow SSL best security practices:</B>\n<BR><A HREF=\"https://github.com/ssllabs/research/wiki/SSL-and-TLS-Deployment-Best-Practices\"
361
+ TARGET=\"_blank\">SSL and TLS Deployment Best Practices</A>\n<BR><A HREF=\"http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_1-1/ssl.html\"
362
+ TARGET=\"_blank\">http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_1-1/ssl.html</A>\n<BR><A
363
+ HREF=\"http://httpd.apache.org/docs/2.0/mod/mod_ssl.html#sslciphersuite\"
364
+ TARGET=\"_blank\">http://httpd.apache.org/docs/2.0/mod/mod_ssl.html#sslciphersuite</A>\n<BR><A
365
+ HREF=\"http://www.megasecurity.org/Info/ssl_servers.html\" TARGET=\"_blank\">http://www.megasecurity.org/Info/ssl_servers.html</A><P>]]></SOLUTION>\n
366
+ \ <PCI_FLAG>1</PCI_FLAG>\n <LAST_UPDATE>2017-03-17T00:12:11Z</LAST_UPDATE>\n
367
+ \ </VULN_DETAILS>\n <VULN_DETAILS id=\"qid_38169\">\n <QID
368
+ id=\"qid_38169\">38169</QID>\n <TITLE><![CDATA[SSL Certificate - Self-Signed
369
+ Certificate]]></TITLE>\n <SEVERITY>2</SEVERITY>\n <CATEGORY>General
370
+ remote services</CATEGORY>\n <THREAT><![CDATA[An SSL Certificate associates
371
+ an entity (person, organization, host, etc.) with a Public Key. In an SSL
372
+ connection, the client authenticates the remote server using the server's
373
+ Certificate and extracts the Public Key in the Certificate to establish the
374
+ secure connection.\n<P>\nThe client can trust that the Server Certificate
375
+ belongs the server only if it is signed by a mutually trusted third-party
376
+ Certificate Authority (CA). Self-signed certificates are created generally
377
+ for testing purposes or to avoid paying third-party CAs. These should not
378
+ be used on any production or critical servers.\n<P>\nBy exploiting this vulnerability,
379
+ an attacker can impersonate the server by presenting a fake self-signed certificate.
380
+ If the client knows that the server does not have a trusted certificate, it
381
+ will accept this spoofed certificate and communicate with the remote server.]]></THREAT>\n
382
+ \ <IMPACT><![CDATA[By exploiting this vulnerability, an attacker can
383
+ launch a man-in-the-middle attack.]]></IMPACT>\n <SOLUTION><![CDATA[Please
384
+ install a server certificate signed by a trusted third-party Certificate Authority.]]></SOLUTION>\n
385
+ \ <PCI_FLAG>1</PCI_FLAG>\n <LAST_UPDATE>2009-05-25T03:59:26Z</LAST_UPDATE>\n
386
+ \ </VULN_DETAILS>\n <VULN_DETAILS id=\"qid_38170\">\n <QID
387
+ id=\"qid_38170\">38170</QID>\n <TITLE><![CDATA[SSL Certificate - Subject
388
+ Common Name Does Not Match Server FQDN]]></TITLE>\n <SEVERITY>2</SEVERITY>\n
389
+ \ <CATEGORY>General remote services</CATEGORY>\n <THREAT><![CDATA[An
390
+ SSL Certificate associates an entity (person, organization, host, etc.) with
391
+ a Public Key. In an SSL connection, the client authenticates the remote server
392
+ using the server's Certificate and extracts the Public Key in the Certificate
393
+ to establish the secure connection.\n<P>\nA certificate whose Subject commonName
394
+ or subjectAltName does not match the server FQDN offers only encryption without
395
+ authentication.\n<P>\nPlease note that a false positive reporting of this
396
+ vulnerability is possible in the following case:\n<UL>If the common name of
397
+ the certificate uses a wildcard such as *.somedomainname.com and the reverse
398
+ DNS resolution of the target IP is not configured. In this case there is no
399
+ way for Qualys to associate the wildcard common name to the IP. Adding a reverse
400
+ DNS lookup entry to the target IP will solve this problem.\n</UL>]]></THREAT>\n
401
+ \ <IMPACT><![CDATA[A man-in-the-middle attacker can exploit this vulnerability
402
+ in tandem with a DNS cache poisoning attack to lure the client to another
403
+ server, and then steal all the encryption communication.]]></IMPACT>\n <SOLUTION><![CDATA[Please
404
+ install a server certificate whose Subject commonName or subjectAltName matches
405
+ the server FQDN.]]></SOLUTION>\n <PCI_FLAG>0</PCI_FLAG>\n <LAST_UPDATE>2015-08-12T17:39:01Z</LAST_UPDATE>\n
406
+ \ </VULN_DETAILS>\n <VULN_DETAILS id=\"qid_38173\">\n <QID
407
+ id=\"qid_38173\">38173</QID>\n <TITLE><![CDATA[SSL Certificate - Signature
408
+ Verification Failed Vulnerability]]></TITLE>\n <SEVERITY>2</SEVERITY>\n
409
+ \ <CATEGORY>General remote services</CATEGORY>\n <THREAT><![CDATA[An
410
+ SSL Certificate associates an entity (person, organization, host, etc.) with
411
+ a Public Key. In an SSL connection, the client authenticates the remote server
412
+ using the server's Certificate and extracts the Public Key in the Certificate
413
+ to establish the secure connection. The authentication is done by verifying
414
+ that the public key in the certificate is signed by a trusted third-party
415
+ Certificate Authority.\n<P>\nIf a client is unable to verify the certificate,
416
+ it can abort communication or prompt the user to continue the communication
417
+ without authentication.]]></THREAT>\n <IMPACT><![CDATA[By exploiting
418
+ this vulnerability, man-in-the-middle attacks in tandem with DNS cache poisoning
419
+ can occur.\n<P>\nException:<BR>\nIf the server communicates only with a restricted
420
+ set of clients who have the server certificate or the trusted CA certificate,
421
+ then the server or CA certificate may not be available publicly, and the scan
422
+ will be unable to verify the signature.]]></IMPACT>\n <SOLUTION><![CDATA[Please
423
+ install a server certificate signed by a trusted third-party Certificate Authority.]]></SOLUTION>\n
424
+ \ <PCI_FLAG>1</PCI_FLAG>\n <LAST_UPDATE>2009-05-23T00:02:29Z</LAST_UPDATE>\n
425
+ \ </VULN_DETAILS>\n <VULN_DETAILS id=\"qid_38601\">\n <QID
426
+ id=\"qid_38601\">38601</QID>\n <TITLE><![CDATA[SSL/TLS use of weak
427
+ RC4 cipher]]></TITLE>\n <SEVERITY>3</SEVERITY>\n <CATEGORY>General
428
+ remote services</CATEGORY>\n <THREAT><![CDATA[Secure Sockets Layer
429
+ (SSL v2/v3) and Transport Layer Security (TLS ) protocols provide integrity,
430
+ confidentiality and authenticity services to other protocols that lack these
431
+ features.\n<P>\nSSL/TLS protocols use ciphers such as AES,DES, 3DES and RC4
432
+ to encrypt the content of the higher layer protocols and thus provide the
433
+ confidentiality service. Normally the output of an encryption process is a
434
+ sequence of random looking bytes. It was known that RC4 output has some bias
435
+ in the output. Recently a group of researchers has discovered that the there
436
+ is a stronger bias in RC4, which make statistical analysis of ciphertext more
437
+ practical.\n<P>\nThe described attack is to inject a malicious javascript
438
+ into the victim's browser that would ensure that there are multiple connections
439
+ being established with a target website and the same HTTP cookie is sent multiple
440
+ times to the website in encrypted form. This provides the attacker a large
441
+ set of ciphertext samples, that can be used for statistical analysis.\n\n<P>NOTE:
442
+ On 3/12/15 NVD changed the CVSS v2 access complicity from high to medium.
443
+ As a result Qualys revised the CVSS score to 4.3 immediately. On 5/4/15 Qualys
444
+ is also revising the severity to level 3.]]></THREAT>\n <IMPACT><![CDATA[If
445
+ this attack is carried out and an HTTP cookie is recovered, then the attacker
446
+ can use the cookie to impersonate the user whose cookie was recovered.\n<P>\nThis
447
+ attack is not very practical as it requires the attacker to have access to
448
+ millions of samples of ciphertext, but there are certain assumptions that
449
+ an attacker can make to improve the chances of recovering the cleartext from
450
+ cihpertext. For examples HTTP cookies are either base64 encoded or hex digits.
451
+ This information can help the attacker in their efforts to recover the cookie.]]></IMPACT>\n
452
+ \ <SOLUTION><![CDATA[RC4 should not be used where possible. One reason
453
+ that RC4 was still being used was BEAST and Lucky13 attacks against CBC mode
454
+ ciphers in SSL and TLS. However, TLSv 1.2 or later address these issues.]]></SOLUTION>\n
455
+ \ <PCI_FLAG>0</PCI_FLAG>\n <LAST_UPDATE>2016-01-29T19:32:26Z</LAST_UPDATE>\n
456
+ \ <CVE_ID_LIST>\n <CVE_ID>\n <ID><![CDATA[CVE-2013-2566]]></ID>\n
457
+ \ <URL><![CDATA[http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2566]]></URL>\n
458
+ \ </CVE_ID>\n <CVE_ID>\n <ID><![CDATA[CVE-2015-2808]]></ID>\n
459
+ \ <URL><![CDATA[http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808]]></URL>\n
460
+ \ </CVE_ID>\n </CVE_ID_LIST>\n <BUGTRAQ_ID_LIST>\n <BUGTRAQ_ID>\n
461
+ \ <ID><![CDATA[91787]]></ID>\n <URL><![CDATA[http://www.securityfocus.com/bid/91787]]></URL>\n
462
+ \ </BUGTRAQ_ID>\n <BUGTRAQ_ID>\n <ID><![CDATA[58796]]></ID>\n
463
+ \ <URL><![CDATA[http://www.securityfocus.com/bid/58796]]></URL>\n
464
+ \ </BUGTRAQ_ID>\n <BUGTRAQ_ID>\n <ID><![CDATA[73684]]></ID>\n
465
+ \ <URL><![CDATA[http://www.securityfocus.com/bid/73684]]></URL>\n
466
+ \ </BUGTRAQ_ID>\n </BUGTRAQ_ID_LIST>\n </VULN_DETAILS>\n
467
+ \ <VULN_DETAILS id=\"qid_38603\">\n <QID id=\"qid_38603\">38603</QID>\n
468
+ \ <TITLE><![CDATA[SSLv3 Padding Oracle Attack Information Disclosure
469
+ Vulnerability (POODLE)]]></TITLE>\n <SEVERITY>3</SEVERITY>\n <CATEGORY>General
470
+ remote services</CATEGORY>\n <THREAT><![CDATA[The SSL protocol 3.0
471
+ design error, uses nondeterministic CBC padding, which makes it easier for
472
+ man-in-the-middle attacks. \n<P>\nThe target supports SSLv3, which makes it
473
+ vulnerable to POODLE (Padding Oracle On Downgraded Legacy Encryption), even
474
+ if it also supports more recent versions of TLS. It's subject to a downgrade
475
+ attack, in which the attacker tricks the browser into connecting with SSLv3.]]></THREAT>\n
476
+ \ <IMPACT><![CDATA[An attacker who can take a man-in-the-middle (MitM)
477
+ position can exploit this vulnerability and gain access to encrypted communication
478
+ between a client and server.]]></IMPACT>\n <SOLUTION><![CDATA[Disable
479
+ SSLv3 support to avoid this vulnerability.<P>\nExamples to disable SSLv3.<BR>\nnginx:
480
+ list specific allowed protocols in the &quot;ssl_protocols&quot; line. Make
481
+ sure SSLv2 and SSLv3 is not listed. For example: ssl_protocols TLSv2 TLSv1.1
482
+ TLSv1.2;<BR>\nApache: Add -SSLv3 to the &quot;SSLProtocol&quot; line. <BR>\n<A
483
+ HREF=\"https://support.microsoft.com/kb/187498/en-us\" TARGET=\"_blank\">How
484
+ to disable SSL 3.0 on Microsoft IIS</A>.\n<P>For PCI, please refer to the
485
+ Qualys <A HREF=\"https://community.qualys.com/thread/15280\" TARGET=\"_blank\">community
486
+ article</A>.]]></SOLUTION>\n <CORRELATION>\n <EXPLOITABILITY>\n
487
+ \ <EXPLT_SRC>\n <SRC_NAME><![CDATA[Metasploit]]></SRC_NAME>\n
488
+ \ <EXPLT_LIST>\n <EXPLT>\n <REF><![CDATA[CVE-2014-3566]]></REF>\n
489
+ \ <DESC><![CDATA[HTTP SSL/TLS Version Detection (POODLE scanner)
490
+ - Metasploit Ref : /modules/auxiliary/scanner/http/ssl_version]]></DESC>\n
491
+ \ <LINK><![CDATA[https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/ssl_version.rb]]></LINK>\n
492
+ \ </EXPLT>\n </EXPLT_LIST>\n </EXPLT_SRC>\n
493
+ \ </EXPLOITABILITY>\n </CORRELATION>\n <PCI_FLAG>1</PCI_FLAG>\n
494
+ \ <LAST_UPDATE>2016-01-06T21:57:28Z</LAST_UPDATE>\n <VENDOR_REFERENCE_LIST>\n
495
+ \ <VENDOR_REFERENCE>\n <ID><![CDATA[POODLE]]></ID>\n <URL><![CDATA[https://www.openssl.org/~bodo/ssl-poodle.pdf]]></URL>\n
496
+ \ </VENDOR_REFERENCE>\n </VENDOR_REFERENCE_LIST>\n <CVE_ID_LIST>\n
497
+ \ <CVE_ID>\n <ID><![CDATA[CVE-2014-3566]]></ID>\n <URL><![CDATA[http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566]]></URL>\n
498
+ \ </CVE_ID>\n </CVE_ID_LIST>\n <BUGTRAQ_ID_LIST>\n <BUGTRAQ_ID>\n
499
+ \ <ID><![CDATA[70574]]></ID>\n <URL><![CDATA[http://www.securityfocus.com/bid/70574]]></URL>\n
500
+ \ </BUGTRAQ_ID>\n </BUGTRAQ_ID_LIST>\n </VULN_DETAILS>\n
501
+ \ <VULN_DETAILS id=\"qid_38606\">\n <QID id=\"qid_38606\">38606</QID>\n
502
+ \ <TITLE><![CDATA[SSL Server Has SSLv3 Enabled Vulnerability]]></TITLE>\n
503
+ \ <SEVERITY>3</SEVERITY>\n <CATEGORY>General remote services</CATEGORY>\n
504
+ \ <THREAT><![CDATA[SSL 3.0 is an obsolete and insecure protocol.<BR>\nEncryption
505
+ in SSL 3.0 uses either the RC4 stream cipher, or a block cipher in CBC mode.<BR>\nRC4
506
+ is known to have biases, and the block cipher in CBC mode is vulnerable to
507
+ the POODLE attack.<P>\n\nThe SSLv3 protocol is insecure due to the POODLE
508
+ attack and the weakness of RC4 cipher.<P>\nNote: In April 2016, PCI released
509
+ <A HREF=\"https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-2.pdf\"
510
+ TARGET=\"_blank\">PCI DSS v3.2</A> announcing that NIST no longer considers
511
+ Secure Socket Layers (SSL) v3.0 protocol as acceptable for protecting data
512
+ and that all versions of SSL versions do not meet the PCI definition of &quot;strong
513
+ cryptography.&quot;<P>]]></THREAT>\n <IMPACT><![CDATA[An attacker can
514
+ exploit this vulnerability to read secure communications or maliciously modify
515
+ messages.]]></IMPACT>\n <SOLUTION><![CDATA[Disable the SSL 3.0 protocol
516
+ in the client and in the server, refer to \nHow to disable SSLv3 : <A HREF=\"http://disablessl3.com/\"
517
+ TARGET=\"_blank\">Disable SSLv3</A>]]></SOLUTION>\n <PCI_FLAG>1</PCI_FLAG>\n
518
+ \ <LAST_UPDATE>2017-07-10T18:08:39Z</LAST_UPDATE>\n </VULN_DETAILS>\n
519
+ \ <VULN_DETAILS id=\"qid_38628\">\n <QID id=\"qid_38628\">38628</QID>\n
520
+ \ <TITLE><![CDATA[SSL/TLS Server supports TLSv1.0]]></TITLE>\n <SEVERITY>3</SEVERITY>\n
521
+ \ <CATEGORY>General remote services</CATEGORY>\n <THREAT><![CDATA[TLS
522
+ is capable of using a multitude of ciphers (algorithms) to create the public
523
+ and private key pairs.<BR>\nFor example if TLSv1.0 uses either the RC4 stream
524
+ cipher, or a block cipher in CBC mode.<BR>\nRC4 is known to have biases and
525
+ the block cipher in CBC mode is vulnerable to the POODLE attack.<P>\n\nTLSv1.0,
526
+ if configured to use the same cipher suites as SSLv3, includes a means by
527
+ which a TLS implementation can downgrade the connection to SSL v3.0, thus
528
+ weakening security.<P>\n\n<A HREF=\"https://blog.qualys.com/ssllabs/2014/12/08/poodle-bites-tls\"
529
+ TARGET=\"_blank\">A POODLE-type</A> attack could also be launched directly
530
+ at TLS without negotiating a downgrade.<P>\n\n<B> This QID will be marked
531
+ as a Fail for PCI as of May 1st, 2017 in accordance with the new standards.
532
+ \ For existing implementations, Merchants will be able to submit a PCI False
533
+ Positive / Exception Request and provide proof of their Risk Mitigation and
534
+ Migration Plan, which will result in a pass for PCI up until June 30th, 2018.\n<P>\n
535
+ Further details can be found at: <A HREF=\"https://community.qualys.com/message/34120\"
536
+ TARGET=\"_blank\">NEW PCI DSS v3.2 and Migrating from SSL and Early TLS v1.1</A>\n</B>\n<P>]]></THREAT>\n
537
+ \ <IMPACT><![CDATA[An attacker can exploit cryptographic flaws to conduct
538
+ man-in-the-middle type attacks or to decryption communications.<P>\nFor example:
539
+ An attacker could force a downgrade from the TLS protocol to the older SSLv3.0
540
+ protocol and exploit the POODLE vulnerability, read secure communications
541
+ or maliciously modify messages.<P>\n<A HREF=\"https://blog.qualys.com/ssllabs/2014/12/08/poodle-bites-tls\"
542
+ TARGET=\"_blank\">A POODLE-type</A> attack could also be launched directly
543
+ at TLS without negotiating a downgrade.<P>]]></IMPACT>\n <SOLUTION><![CDATA[Disable
544
+ the use of TLSv1.0 protocol in favor of a cryptographically stronger protocol
545
+ such as TLSv1.2.\nThe following openssl commands can be used to do a manual
546
+ test:\nopenssl s_client -connect ip:port -tls1\n\nIf the test is successful,
547
+ then the target support TLSv1]]></SOLUTION>\n <PCI_FLAG>1</PCI_FLAG>\n
548
+ \ <LAST_UPDATE>2017-06-09T18:16:07Z</LAST_UPDATE>\n </VULN_DETAILS>\n
549
+ \ <VULN_DETAILS id=\"qid_38657\">\n <QID id=\"qid_38657\">38657</QID>\n
550
+ \ <TITLE><![CDATA[Birthday attacks against TLS ciphers with 64bit block
551
+ size vulnerability (Sweet32)]]></TITLE>\n <SEVERITY>3</SEVERITY>\n
552
+ \ <CATEGORY>General remote services</CATEGORY>\n <THREAT><![CDATA[Legacy
553
+ block ciphers having block size of 64 bits are vulnerable to a practical collision
554
+ attack when used in CBC mode. \nAll versions of SSL/TLS protocol support cipher
555
+ suites which use DES or 3DES as the symmetric encryption cipher are affected.]]></THREAT>\n
556
+ \ <IMPACT><![CDATA[Remote attackers can obtain cleartext data via a
557
+ birthday attack against a long-duration encrypted session.]]></IMPACT>\n <SOLUTION><![CDATA[Disable
558
+ and stop using DES and 3DES ciphers.\nThe following openssl commands can be
559
+ used to do a manual test:\nopenssl s_client -connect ip:port -cipher &quot;DES:3DES&quot;
560
+ -ssl2\nopenssl s_client -connect ip:port -cipher &quot;DES:3DES&quot; -ssl3\nopenssl
561
+ s_client -connect ip:port -cipher &quot;DES:3DES&quot; -tls1\nopenssl s_client
562
+ -connect ip:port -cipher &quot;DES:3DES&quot; -tls1_1\nopenssl s_client -connect
563
+ ip:port -cipher &quot;DES:3DES&quot; -tls1_2\n\nIf any of these tests is successful,
564
+ then the target is vulnerable to Sweet32.]]></SOLUTION>\n <PCI_FLAG>0</PCI_FLAG>\n
565
+ \ <LAST_UPDATE>2017-06-27T06:14:43Z</LAST_UPDATE>\n <CVE_ID_LIST>\n
566
+ \ <CVE_ID>\n <ID><![CDATA[CVE-2016-2183]]></ID>\n <URL><![CDATA[http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183]]></URL>\n
567
+ \ </CVE_ID>\n </CVE_ID_LIST>\n <BUGTRAQ_ID_LIST>\n <BUGTRAQ_ID>\n
568
+ \ <ID><![CDATA[92630]]></ID>\n <URL><![CDATA[http://www.securityfocus.com/bid/92630]]></URL>\n
569
+ \ </BUGTRAQ_ID>\n <BUGTRAQ_ID>\n <ID><![CDATA[95568]]></ID>\n
570
+ \ <URL><![CDATA[http://www.securityfocus.com/bid/95568]]></URL>\n
571
+ \ </BUGTRAQ_ID>\n </BUGTRAQ_ID_LIST>\n </VULN_DETAILS>\n
572
+ \ <VULN_DETAILS id=\"qid_38685\">\n <QID id=\"qid_38685\">38685</QID>\n
573
+ \ <TITLE><![CDATA[SSL Certificate - Invalid Maximum Validity Date Detected]]></TITLE>\n
574
+ \ <SEVERITY>2</SEVERITY>\n <CATEGORY>General remote services</CATEGORY>\n
575
+ \ <THREAT><![CDATA[Starting 1 April 2015, Certification Authorities
576
+ (CAs) are not permitted to issue SSL certificates (issued from a public root)
577
+ with a validity period greater than 39 months. \n<BR>\nSSL/TLS certificate
578
+ maximum validity is three years (39 months) for Domain Validated (DV) and
579
+ Organization Validated (OV) Certificates.<BR>\nSSL certificates have limited
580
+ validity periods so that the certificate's holder identity information is
581
+ re-authenticated more frequently. \n<P>\nIt is detected that maximum validity
582
+ of certificate on the system is more than what is recommended.]]></THREAT>\n
583
+ \ <IMPACT><![CDATA[By exploiting this vulnerability, an attacker can
584
+ launch a man-in-the-middle attack.]]></IMPACT>\n <SOLUTION><![CDATA[Please
585
+ install a server certificate with recommended maximum validity.]]></SOLUTION>\n
586
+ \ <PCI_FLAG>1</PCI_FLAG>\n <LAST_UPDATE>2017-10-02T22:32:24Z</LAST_UPDATE>\n
587
+ \ </VULN_DETAILS>\n <VULN_DETAILS id=\"qid_82003\">\n <QID
588
+ id=\"qid_82003\">82003</QID>\n <TITLE><![CDATA[ICMP Timestamp Request]]></TITLE>\n
589
+ \ <SEVERITY>1</SEVERITY>\n <CATEGORY>TCP/IP</CATEGORY>\n <THREAT><![CDATA[ICMP
590
+ (Internet Control and Error Message Protocol) is a protocol encapsulated in
591
+ IP packets. It's principal purpose is to provide a protocol layer able to
592
+ inform gateways of the inter-connectivity and accessibility of other gateways
593
+ or hosts. &quot;ping&quot; is a well-known program for determining if a host
594
+ is up or down. It uses ICMP echo packets. ICMP timestamp packets are used
595
+ to synchronize clocks between hosts.]]></THREAT>\n <IMPACT><![CDATA[Unauthorized
596
+ users can obtain information about your network by sending ICMP timestamp
597
+ packets. For example, the internal systems clock should not be disclosed since
598
+ some internal daemons use this value to calculate ID or sequence numbers (i.e.,
599
+ on SunOS servers).]]></IMPACT>\n <SOLUTION><![CDATA[You can filter
600
+ ICMP messages of type &quot;Timestamp&quot; and &quot;Timestamp Reply&quot;
601
+ at the firewall level. Some system administrators choose to filter most types
602
+ of ICMP messages for various reasons. For example, they may want to protect
603
+ their internal hosts from ICMP-based Denial Of Service attacks, such as the
604
+ <I>Ping of Death</I> or <I>Smurf</I> attacks. \n<P>\nHowever, you should never
605
+ filter <B>ALL</B> ICMP messages, as some of them (&quot;Don't Fragment&quot;,
606
+ &quot;Destination Unreachable&quot;, &quot;Source Quench&quot;, etc) are necessary
607
+ for proper behavior of Operating System TCP/IP stacks.\n<P>\nIt may be wiser
608
+ to contact your network consultants for advice, since this issue impacts your
609
+ overall network reliability and security.]]></SOLUTION>\n <PCI_FLAG>0</PCI_FLAG>\n
610
+ \ <LAST_UPDATE>2009-04-29T03:59:17Z</LAST_UPDATE>\n <CVE_ID_LIST>\n
611
+ \ <CVE_ID>\n <ID><![CDATA[CVE-1999-0524]]></ID>\n <URL><![CDATA[http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0524]]></URL>\n
612
+ \ </CVE_ID>\n </CVE_ID_LIST>\n </VULN_DETAILS>\n </VULN_DETAILS_LIST>\n
613
+ \ </GLOSSARY>\n <APPENDICES>\n <NO_VULNS>\n <IP_LIST>\n <RANGE>\n
614
+ \ <START>192.168.1.100</START>\n <END>192.168.1.100</END>\n
615
+ \ </RANGE>\n </IP_LIST>\n </NO_VULNS>\n <TEMPLATE_DETAILS>\n
616
+ \ <FILTER_SUMMARY>\n Status:New, Active, Re-Opened, Fixed\n Vulnerabilities:\n
617
+ \ State:Active\n Included Operating Systems:\n All Operating
618
+ Systems\n </FILTER_SUMMARY>\n </TEMPLATE_DETAILS>\n </APPENDICES>\n</ASSET_DATA_REPORT>\n<!--
619
+ CONFIDENTIAL AND PROPRIETARY INFORMATION. Qualys provides the QualysGuard
620
+ Service \"As Is,\" without any warranty of any kind. Qualys makes no warranty
621
+ that the information contained in this report is complete or error-free. Copyright
622
+ 2017, Qualys, Inc. //--> \n"
623
+ http_version:
624
+ recorded_at: Tue, 12 Dec 2017 10:00:00 GMT
625
+ recorded_with: VCR 4.0.0