SearchSearch   ProfileProfile   Log inLog in   RegisterRegister 

vulnerabilities in 2.0

 
Post new topic   Reply to topic    FirstSpot Forum Index -> Pre-sales Support Forum
View previous topic :: View next topic  
Author Message
baggeh



Joined: 04 Nov 2003
Posts: 9

PostPosted: Sun Dec 14, 2003 9:44 pm    
Post subject: vulnerabilities in 2.0

This is a vanilla install of firstspot 2.0
Basically apache and php needs updating~

nessus scan results- [URL hidden]
nikto scan results-
+ Server: Apache/1.3.27 (Win32) PHP/4.3.2
+ Allowed HTTP Methods: GET, HEAD, OPTIONS, TRACE
+ HTTP method 'TRACE' is typically only used for debugging. It should be disabled.
+ Apache/1.3.27 appears to be outdated (current is at least Apache/2.0.47). Apache 1.3.28 is still maintained and considered secure.
+ PHP/4.3.2 appears to be outdated (current is at least 4.3.4RC2)
+ PHP/4.3.2 - PHP below 4.3.3 may allow local attackers to safe mode and gain access to unauthorized files. BID-8203.
+ Apache/1.3.27 - Windows and OS/2 version vulnerable to remote exploit. CAN-2003-0460
+ /icons/ - Directory indexing is enabled, it should only be enabled for specific directories (if required). If indexing is not used all, the /icons directory should be removed. (GET)
+ /manual/images/ - Apache 2.0 directory indexing is enabled, it should only be enabled for specific directories (if required). Apache's manual should be removed and directory indexing disabled. (GET)
+ / - TRACE option appears to allow XSS or credential theft. See http://www.cgisecurity.com/whitehat-mirror/WhitePaper_screen.pdf for details (TRACE)
+ / - TRACK option ('TRACE' alias) appears to allow XSS or credential theft. See http://www.cgisecurity.com/whitehat-mirror/WhitePaper_screen.pdf for details (TRACK)
+ /.htaccess - Contains authorization information (GET)
+ /.htpasswd - Contains authorization information (GET)
+ /doc/ - The /doc directory is browsable. This may be /usr/doc. (GET)
+ /ext.dll?MfcIsapiCommand=LoadPage&page=admin.hts%20&a0=add&a1=root&a2=%5C - This check (A) sets up the next bad blue test (B) for possible exploit. see http://www.badblue.com/down.htm (GET)
+ /log/ - Ahh...log information...fun! (GET)
+ /manual/ - Web server manual? tsk tsk. (GET)
+ /www/ - This might be interesting... (GET)
Back to top
kevin
Forum facilitator


Joined: 26 Sep 2003
Posts: 442

PostPosted: Mon Dec 15, 2003 2:00 am    
Post subject:

Hello baggeh,

Thanks for pointing out the need for updating our built-in modules.

We'll get it fixed. Meanwhile, I've hidden the URL of your web site, just to avoid any possible spamming or URL crawling by spammers.

~ Patronsoft Limted ~
Back to top
Display posts from previous:   
Post new topic   Reply to topic    FirstSpot Forum Index -> Pre-sales Support Forum All times are GMT
Page 1 of 1

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum


Powered by phpBB © 2001, 2005 phpBB Group