View previous topic :: View next topic |
Author |
Message |
baggeh
Joined: 04 Nov 2003 Posts: 9
|
Posted: Sun Dec 14, 2003 9:44 pm Post subject: vulnerabilities in 2.0 |
|
|
This is a vanilla install of firstspot 2.0
Basically apache and php needs updating~
nessus scan results- [URL hidden]
nikto scan results-
+ Server: Apache/1.3.27 (Win32) PHP/4.3.2
+ Allowed HTTP Methods: GET, HEAD, OPTIONS, TRACE
+ HTTP method 'TRACE' is typically only used for debugging. It should be disabled.
+ Apache/1.3.27 appears to be outdated (current is at least Apache/2.0.47). Apache 1.3.28 is still maintained and considered secure.
+ PHP/4.3.2 appears to be outdated (current is at least 4.3.4RC2)
+ PHP/4.3.2 - PHP below 4.3.3 may allow local attackers to safe mode and gain access to unauthorized files. BID-8203.
+ Apache/1.3.27 - Windows and OS/2 version vulnerable to remote exploit. CAN-2003-0460
+ /icons/ - Directory indexing is enabled, it should only be enabled for specific directories (if required). If indexing is not used all, the /icons directory should be removed. (GET)
+ /manual/images/ - Apache 2.0 directory indexing is enabled, it should only be enabled for specific directories (if required). Apache's manual should be removed and directory indexing disabled. (GET)
+ / - TRACE option appears to allow XSS or credential theft. See http://www.cgisecurity.com/whitehat-mirror/WhitePaper_screen.pdf for details (TRACE)
+ / - TRACK option ('TRACE' alias) appears to allow XSS or credential theft. See http://www.cgisecurity.com/whitehat-mirror/WhitePaper_screen.pdf for details (TRACK)
+ /.htaccess - Contains authorization information (GET)
+ /.htpasswd - Contains authorization information (GET)
+ /doc/ - The /doc directory is browsable. This may be /usr/doc. (GET)
+ /ext.dll?MfcIsapiCommand=LoadPage&page=admin.hts%20&a0=add&a1=root&a2=%5C - This check (A) sets up the next bad blue test (B) for possible exploit. see http://www.badblue.com/down.htm (GET)
+ /log/ - Ahh...log information...fun! (GET)
+ /manual/ - Web server manual? tsk tsk. (GET)
+ /www/ - This might be interesting... (GET) |
|
Back to top |
|
|
kevin Forum facilitator
Joined: 26 Sep 2003 Posts: 442
|
Posted: Mon Dec 15, 2003 2:00 am Post subject: |
|
|
Hello baggeh,
Thanks for pointing out the need for updating our built-in modules.
We'll get it fixed. Meanwhile, I've hidden the URL of your web site, just to avoid any possible spamming or URL crawling by spammers.
~ Patronsoft Limted ~ |
|
Back to top |
|
|
|
|
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
|
Powered by phpBB © 2001, 2005 phpBB Group
| |