Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Pentestreport Romio

Download as pdf or txt
Download as pdf or txt
You are on page 1of 72

PENETRATION TEST REPORT

Security Penetration Test of


Metasploitable 2

Services provided to:


Foundations of Cyber Security (CSOL 500)

Version-V1.0

V1 – FEBRUARY 24, 2019


PREPARED BY:
JESSICA ROMIO

PRESENTED TO:
ASHTON MOZANO
USD
Penetration Test Report – Jessica Romio

Table of Contents
Disclaimer...................................................................................................................................................... 3
Executive Summary....................................................................................................................................... 3
Scope ......................................................................................................................................................... 3
Summary of Findings..................................................................................................................................... 4
Vsftpd Backdoor ........................................................................................................................................ 5
Telnet into Root ........................................................................................................................................ 7
Rexec Passwordless / Unencrypted Cleartext Login ................................................................................. 8
Rogue shell backdoor – telnet port 1524.................................................................................................. 8
UnrealIRCD Backdoor ................................................................................................................................ 8
VNC Brute Force Login ............................................................................................................................ 10
Java-RMI .................................................................................................................................................. 12
DOS Attack .............................................................................................................................................. 12
Conclusion ................................................................................................................................................... 13
References .................................................................................................................................................. 14
Appendix A: OpenVAS Scan Result ............................................................................................................. 15

2|Page
Penetration Test Report – Jessica Romio

Disclaimer
Jessica Romio was employed by Ashton Mozano of the USD Cyber Security Operations and Leadership,
Foundations of Cyber Security course to perform a penetrations test on the target, Metasploitable 2, to
determine its possible exposure. Jessica Romio is not liable for any damages resulting from the use of
this information and the report is provided as is. The assessment is an analysis of a capture in time of
the posture of the environment and the environment and results could have changed since what was
presented in this report. This report provides guidance and is in no way a full representation of all the
risks that are threatening the system.

Executive Summary
All the activities and tests on the system were conducted to simulate a malicious attacker aiming to
perform a targeted attack on the Metasploitable 2 system. The efforts presented were done with the
goal to gain root access to the system, with the assumption that further attacks could be carried out
once the root access level is reached. The assessment was conducted in accordance with general cyber
security practices and tools. The initial scan results were conducted on February 23rd, 2019 and the
testing took place on February 24th 2019. The detailed scan results report can be found in Appendix A.

Scope
The scope of this test is limited to one test environment, Metasploitable 2. Metasploitable 2 is an
intentionally vulnerable virtual machine that was designed for training and testing. The machine was
downloaded to a local machine and assigned the IP address of 192.168.87.129. Testing was conducted
through a Kali Linux VM on the same network.

TABLE 1
Target Machine IP Address
Metasploitable 2 192.168.87.129

3|Page
Penetration Test Report – Jessica Romio

Summary of Findings
When performing the penetration test, an OpenVas scan was run on the target system to identify
possible vulnerabilities. Overall there were 20 high findings, 36 medium finding and 3 that were found to
be low findings. Some of the highlighted vulnerabilities were the Rexec Passwordless / Unencrypted
Cleartext Login, the UnrealIRCd backdoor, the port 1524 backdoor and the Java RMI Server Insecure
Default Configuration Remote Code Execution Vulnerability. The below figures summarize some of the
top findings in OpenVas.

TABLE 2
HOST HIGH MEDIUM LOW
192.168.87.129 20 36 3
Total: 1 20 36 3

FIGURE 1

4|Page
Penetration Test Report – Jessica Romio

Along with performing an OpenVas scan to search for possible attack vectors, an nmap port scan was
also performed to see which ports were open. The following figure summarizes the port findings from
the scan.

FIGURE 2
Using a Kali Linux virtual machine along with the Metasploit Framework (MSF), I was able to take
advantage of many of these vulnerabilities and gain root access into the Metasploitable 2 machine. I
chose the top seven exploited vulnerabilities to highlight in this report. It is possible that many of the
other vulnerabilities found in OpenVas, as well as others, are exploitable as well and should be
mitigated.

Vsftpd Backdoor
The nmap port scan showed that the ftp port 21 was open and running a version of vsftpd 2.3.4 which
was also an open finding in the OpenVas scan as a backdoor vulnerability. A search in the MSF console
showed a possible exploit for the vsftpd backdoor. Setting the RHOST to the IP address of
Metasploitable 2 and running the exploit took us right into the machine. A simple whoami command

5|Page
Penetration Test Report – Jessica Romio

showed the user to be root.

FIGURE 3

FIGURE 4

6|Page
Penetration Test Report – Jessica Romio

Telnet into Root


Telnet was another port that was shown to be open by the nmap scan on the target machine. Using the
terminal within Kali Linux, I ran the telnet command along with the target IP address “telnet
192.168.87.129”. The machine was able to connect to the target IP address and it brought up the
Metasploitable 2 login page. Because the Metasploitable login page shows both the username and
password to log into the machine, I was able to use these credentials and log into the machine. A simple
sudo command, along with the same password, allowed me to elevate privileges to root again.

FIGURE 5

FIGURE 6

7|Page
Penetration Test Report – Jessica Romio

Rexec Passwordless / Unencrypted Cleartext Login


The top finding in the OpenVas report was the rexec login. The command to rexec is “rlogin”. Using the
rlogin command along with the known username of “msfadmin” and the target IP address
192.168.87.129, created a connection to Metasploitable 2. Another sudo command permitted us to
become root.

FIGURE 7

Rogue shell backdoor – telnet port 1524


Another open port in the nmap scan is 1524, which after some research was found to be a possible
backdoor. The nmap shows it as the Metasploitable root shell. Using the telnet command again,
however this time including the port 1524 allowed us straight into the system as root.

FIGURE 8

UnrealIRCD Backdoor
The OpenVas scan showed another vulnerability titled “Check for backdoor in UnrealIRCD”. Clicking on
this possible attack vector and reading more information showed a little more about the attack as well
as a CVE-2010-2075.

8|Page
Penetration Test Report – Jessica Romio

FIGURE 9
Using the “search” command in the msfconsole along with this CVE number yielded an exploit. Setting
the RHOST IP address once again to the IP of the targeted machine allowed us to use this exploit. The
command was executed and a “whoami” revealed the user to be root.

9|Page
Penetration Test Report – Jessica Romio

FIGURE 10

FIGURE 11

VNC Brute Force Login


Another vulnerability found in the OpenVas scan report was the VNC Brute Force Login. Information in
the scan report showed to use the password “password” to connect to the system through VNC.

10 | P a g e
Penetration Test Report – Jessica Romio

FIGURE 12
Using the Remmina VNC client and connecting it to 192.168.87.129, we were able to connect to the
server with root privileges.

FIGURE 13

11 | P a g e
Penetration Test Report – Jessica Romio

Java-RMI
The final attack vector that was used was through the Java RMI registry. Another search in the OpenVas
results shows another vulnerability titled, “Java RMI Server Insecure Default Configuration Remote Code
Execution Vulnerabilty”. Nmap also shows this service to be running on port 1099. A quick search
through Metasploit for a Java RMI related exploit allowed us to fine one titled “Java RMI Server Insecure
Default Configuration Java Code Execution (Metasploit)”. Using the info command on this exploit and
setting the RHOST to the target IP allowed us to configure the exploit. We also had to set the session
number to one and then run the attack. This once again allowed us into Metasploitable 2 as a root user.

FIGURE 14

DOS Attack
A denial of service attack is one where the machine’s resources become unavailable to its intended
users because it is being disrupted by a services, typically done by flooding. One could flood the machine
with ICMP packets. ICMP confirms connectivity and if the requests never end, the system will be flooded
with packets, losing it’s ability to respond to genuine ones and causing a denial of service attack. SYN
flooding could also be used where the source tries to establish a TCP connection, however they never
receive an acknowledgement packet causeing the connection to not be established and it is left open. If
this happens enough, the target will not have enough resources to respond and another denial of
service attack will have occurred. Both of these are possible attack vectors and there are many open TCP
ports open to test the SYN flood. Because I can get into the system as root, I decided to go straight to

12 | P a g e
Penetration Test Report – Jessica Romio

the system. I found a command which asked the operating system to continue opening processes for an
infinite amount of time. The command was “:(){ :|:& };:”.

FIGURE 15
The figure above shows Metasploitable 2 opening and killing processes, this continued until I manually
shut off the system. This was only one was to perform a DoS attack and mitigations should be put in
place to prevent this type of attack from occurring.

Conclusion
Metasploitable 2 had many different vulnerabilities that were exploitable into the system. Any of these
attack vectors could be used by an adversary to gain access into their system. Although there was
security implemented in the system, there were also some obvious weaknesses. The use of default
passwords and some open and unsecure ports make the system susceptible to brute force attacks. Had
a malicious party had the intention of getting into the system, these would have been simple attacks to
take advantage of. The overall goal of the penetration test was met by showing some possible
vulnerabilities to mitigate in the system. Serious consideration and appropriate efforts to mitigate the
vulnerabilities should be applied.

13 | P a g e
Penetration Test Report – Jessica Romio

References
Although I know this page is typically not included in a penetration test report, there were several
references I used throughout the activity and report itself.

Badshah, C., & Badshah, C. (2017, May 10). History of Metasploitables – Chandrapal Badshah – Medium.

Retrieved from https://medium.com/@chandrapal/history-of-metasploitables-af318e0954b1

Denial Of Service Attacks : Explained for Beginners and Dummies. (2014, July 24). Retrieved February 25,

2019, from https://informationtreasure.wordpress.com/2014/07/24/denial-of-service-attacks-

explained-for-beginners-and-dummies/

Handy, N., & Handy, N. (2018, August 02). Kali Linux & Metasploit: Getting Started with Pen Testing.

Retrieved from https://medium.com/cyberdefenders/kali-linux-metasploit-getting-started-with-

pen-testing-89d28944097b

Morris, S. (2018). The Easiest Metasploit Guide You’ll Ever Read. Retrieved February 24, 2019, from

https://www.exploit-db.com/docs/english/44040-the-easiest-metasploit-guide-you’ll-ever-

read.pdf

14 | P a g e
Penetration Test Report – Jessica Romio

Appendix A: OpenVAS Scan Result

15 | P a g e
Scan Report

February 24, 2019

Summary
This document reports on the results of an automatic security scan. All dates are dis-
played using the timezone Coordinated Universal Time, which is abbreviated UTC. The
task was Scan Metasploitable 2. The scan started at Sat Feb 23 19:39:58 2019 UTC and
ended at Sat Feb 23 20:00:35 2019 UTC. The report rst summarises the results found.
Then, for each host, the report describes every issue found. Please consider the advice given
in each description, in order to rectify the issue.

Contents

1 Result Overview 2
1.1 Host Authentications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

2 Results per Host 2


2.1 192.168.87.129 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

2.1.1 High 1524/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

2.1.2 High 6667/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

2.1.3 High 3306/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

2.1.4 High 6200/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

2.1.5 High 514/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

2.1.6 High 80/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

2.1.7 High 1099/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

2.1.8 High 22/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

2.1.9 High 21/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

2.1.10 High 512/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

2.1.11 High 5900/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

2.1.12 High 513/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

2.1.13 High 3632/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

2.1.14 High 5432/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

2.1.15 High 8787/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

2.1.16 High general/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

2.1.17 Medium 6667/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

1
CONTENTS 2

2.1.18 Medium 80/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

2.1.19 Medium 23/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

2.1.20 Medium 22/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

2.1.21 Medium 21/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34

2.1.22 Medium 5900/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35

2.1.23 Medium 5432/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

2.1.24 Medium 25/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43

2.1.25 Medium 445/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52

2.1.26 Medium 2121/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53

2.1.27 Low 80/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53

2.1.28 Low 22/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54

2.1.29 Low general/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55


2 RESULTS PER HOST 3

1 Result Overview

Host High Medium Low Log False Positive


192.168.87.129 20 36 3 0 0
Total: 1 20 36 3 0 0

Vendor security updates are not trusted.


Overrides are on. When a result has an override, this report uses the threat of the override.
Information on overrides is included in the report.
Notes are included in the report.
This report might not show details of all issues that were found.
It only lists hosts that produced issues.
Issues with the threat level Log are not shown.
Issues with the threat level Debug are not shown.
Issues with the threat level False Positive are not shown.
Only results with a minimum QoD of 70 are shown.

This report contains all 59 results selected by the ltering described above. Before ltering
there were 385 results.

1.1 Host Authentications

Host Protocol Result Port/User


192.168.87.129 SMB Success Protocol SMB, Port 445, User

2 Results per Host


2.1 192.168.87.129

Host scan start Sat Feb 23 19:40:13 2019 UTC


Host scan end Sat Feb 23 20:00:35 2019 UTC

Service (Port) Threat Level


1524/tcp High
6667/tcp High
3306/tcp High
6200/tcp High
514/tcp High
80/tcp High
1099/tcp High
22/tcp High
21/tcp High
512/tcp High
. . . (continues) . . .
2 RESULTS PER HOST 4

. . . (continued) . . .
Service (Port) Threat Level
5900/tcp High
513/tcp High
3632/tcp High
5432/tcp High
8787/tcp High
general/tcp High
6667/tcp Medium
80/tcp Medium
23/tcp Medium
22/tcp Medium
21/tcp Medium
5900/tcp Medium
5432/tcp Medium
25/tcp Medium
445/tcp Medium
2121/tcp Medium
80/tcp Low
22/tcp Low
general/tcp Low

2.1.1 High 1524/tcp

High (CVSS: 10.0)


NVT: Possible Backdoor: Ingreslock

Summary
A backdoor is installed on the remote host

Vulnerability Detection Result


The service is answering to an 'id;' command with the following response: uid=0(
,→root) gid=0(root)

Impact
Attackers can exploit this issue to execute arbitrary commands in the context of the application.
Successful attacks will compromise the aected isystem.

Solution
Solution type: Workaround

Vulnerability Detection Method


Details: Possible Backdoor: Ingreslock
OID:1.3.6.1.4.1.25623.1.0.103549
Version used: $Revision: 11327 $

[ return to 192.168.87.129 ]
2 RESULTS PER HOST 5

2.1.2 High 6667/tcp

High (CVSS: 7.5)


NVT: Check for Backdoor in UnrealIRCd

Summary
Detection of backdoor in UnrealIRCd.

Vulnerability Detection Result


Vulnerability was detected according to the Vulnerability Detection Method.

Solution
Solution type: VendorFix
Install latest version of unrealircd and check signatures of software you're installing.

Vulnerability Insight
Remote attackers can exploit this issue to execute arbitrary system commands within the context
of the aected application.
The issue aects Unreal 3.2.8.1 for Linux. Reportedly package Unreal3.2.8.1.tar.gz down-
loaded in November 2009 and later is aected. The MD5 sum of the aected le is
752e46f2d873c1679fa99de3f52a274d. Files with MD5 sum of 7b741e94e867c0a7370553fd01506c66
are not aected.

Vulnerability Detection Method


Details: Check for Backdoor in UnrealIRCd
OID:1.3.6.1.4.1.25623.1.0.80111
Version used: $Revision: 5433 $

References
CVE: CVE-2010-2075
BID:40820
Other:
URL:http://www.unrealircd.com/txt/unrealsecadvisory.20100612.txt
URL:http://seclists.org/fulldisclosure/2010/Jun/277
URL:http://www.securityfocus.com/bid/40820

[ return to 192.168.87.129 ]

2.1.3 High 3306/tcp

High (CVSS: 9.0)


NVT: MySQL / MariaDB weak password

Product detection result


cpe:/a:mysql:mysql:5.0.51a
Detected by MySQL/MariaDB Detection (OID: 1.3.6.1.4.1.25623.1.0.100152)
. . . continues on next page . . .
2 RESULTS PER HOST 6

. . . continued from previous page . . .

Summary
It was possible to login into the remote MySQL as root using weak credentials.

Vulnerability Detection Result


It was possible to login as root with an empty password.

Solution
Solution type: Mitigation
Change the password as soon as possible.

Vulnerability Detection Method


Details: MySQL / MariaDB weak password
OID:1.3.6.1.4.1.25623.1.0.103551
Version used: $Revision: 12175 $

Product Detection Result


Product: cpe:/a:mysql:mysql:5.0.51a
Method: MySQL/MariaDB Detection
OID: 1.3.6.1.4.1.25623.1.0.100152)

[ return to 192.168.87.129 ]

2.1.4 High 6200/tcp

High (CVSS: 7.5)


NVT: vsftpd Compromised Source Packages Backdoor Vulnerability

Summary
vsftpd is prone to a backdoor vulnerability.

Vulnerability Detection Result


Vulnerability was detected according to the Vulnerability Detection Method.

Impact
Attackers can exploit this issue to execute arbitrary commands in the context of the application.
Successful attacks will compromise the aected application.

Solution
Solution type: VendorFix
The repaired package can be downloaded from the referenced link. Please validate the package
with its signature.

Aected Software/OS
The vsftpd 2.3.4 source package is aected.
. . . continues on next page . . .
2 RESULTS PER HOST 7

. . . continued from previous page . . .

Vulnerability Detection Method


Details: vsftpd Compromised Source Packages Backdoor Vulnerability
OID:1.3.6.1.4.1.25623.1.0.103185
Version used: $Revision: 12076 $

References
BID:48539
Other:
URL:http://www.securityfocus.com/bid/48539
URL:http://scarybeastsecurity.blogspot.com/2011/07/alert-vsftpd-download-back
,→doored.html
URL:https://security.appspot.com/vsftpd.html

[ return to 192.168.87.129 ]

2.1.5 High 514/tcp

High (CVSS: 7.5)


NVT: rsh Unencrypted Cleartext Login

Summary
This remote host is running a rsh service.

Vulnerability Detection Result


The rsh service is misconfigured so it is allowing conntections without a passwo
,→rd or with default root:root credentials.

Solution
Solution type: Mitigation
Disable the rsh service and use alternatives like SSH instead.

Vulnerability Insight
rsh (remote shell) is a command line computer program which can execute shell commands as
another user, and on another computer across a computer network.

Vulnerability Detection Method


Details: rsh Unencrypted Cleartext Login
OID:1.3.6.1.4.1.25623.1.0.100080
Version used: $Revision: 13010 $

References
Other:
URL:https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0651

[ return to 192.168.87.129 ]
2 RESULTS PER HOST 8

2.1.6 High 80/tcp

High (CVSS: 10.0)


NVT: TWiki XSS and Command Execution Vulnerabilities

Product detection result


cpe:/a:twiki:twiki:01.Feb.2003
Detected by TWiki Version Detection (OID: 1.3.6.1.4.1.25623.1.0.800399)

Summary
The host is running TWiki and is prone to Cross-Site Scripting (XSS) and Command Execution
Vulnerabilities.

Vulnerability Detection Result


Installed version: 01.Feb.2003
Fixed version: 4.2.4

Impact
Successful exploitation could allow execution of arbitrary script code or commands. This could
let attackers steal cookie-based authentication credentials or compromise the aected application.

Solution
Solution type: VendorFix
Upgrade to version 4.2.4 or later.

Aected Software/OS
TWiki, TWiki version prior to 4.2.4.

Vulnerability Insight
The aws are due to,
- %URLPARAM}}% variable is not properly sanitized which lets attackers conduct cross-site
scripting attack.
- %SEARCH}}% variable is not properly sanitised before being used in an eval() call which lets
the attackers execute perl code through eval injection attack.

Vulnerability Detection Method


Details: TWiki XSS and Command Execution Vulnerabilities
OID:1.3.6.1.4.1.25623.1.0.800320
Version used: $Revision: 12952 $

Product Detection Result


Product: cpe:/a:twiki:twiki:01.Feb.2003
Method: TWiki Version Detection
OID: 1.3.6.1.4.1.25623.1.0.800399)

References
. . . continues on next page . . .
2 RESULTS PER HOST 9

. . . continued from previous page . . .


CVE: CVE-2008-5304, CVE-2008-5305
BID:32668, 32669
Other:
URL:http://twiki.org/cgi-bin/view/Codev.SecurityAlert-CVE-2008-5304
URL:http://twiki.org/cgi-bin/view/Codev/SecurityAlert-CVE-2008-5305

High (CVSS: 7.5)


NVT: phpinfo() output Reporting

Summary
Many PHP installation tutorials instruct the user to create a le called phpinfo.php or similar
containing the phpinfo() statement. Such a le is often left back in the webserver directory.

Vulnerability Detection Result


The following files are calling the function phpinfo() which disclose potentiall
,→y sensitive information:
http://192.168.87.129/mutillidae/phpinfo.php
http://192.168.87.129/phpinfo.php

Impact
Some of the information that can be gathered from this le includes:
The username of the user running the PHP process, if it is a sudo user, the IP address of the host,
the web server version, the system version (Unix, Linux, Windows, ...), and the root directory
of the web server.

Solution
Solution type: Workaround
Delete the listed les or restrict access to them.

Vulnerability Detection Method


Details: phpinfo() output Reporting
OID:1.3.6.1.4.1.25623.1.0.11229
Version used: $Revision: 11992 $

High (CVSS: 7.5)


NVT: Tiki Wiki CMS Groupware < 4.2 Multiple Unspecied Vulnerabilities

Product detection result


cpe:/a:tiki:tikiwiki_cms/groupware:1.9.5
Detected by Tiki Wiki CMS Groupware Version Detection (OID: 1.3.6.1.4.1.25623.1.
,→0.901001)

Summary
Tiki Wiki CMS Groupware is prone to multiple unspecied vulnerabilities, including:
. . . continues on next page . . .
2 RESULTS PER HOST 10

. . . continued from previous page . . .


- An unspecied SQL-injection vulnerability - An unspecied authentication-bypass vulnerability
- An unspecied vulnerability

Vulnerability Detection Result


Installed version: 1.9.5
Fixed version: 4.2

Impact
Exploiting these issues could allow an attacker to compromise the application, access or modify
data, exploit latent vulnerabilities in the underlying database, and gain unauthorized access to
the aected application. Other attacks are also possible.

Solution
Solution type: VendorFix
The vendor has released an advisory and xes. Please see the references for details.

Aected Software/OS
Versions prior to Tiki Wiki CMS Groupware 4.2 are vulnerable.

Vulnerability Detection Method


Details: Tiki Wiki CMS Groupware < 4.2 Multiple Unspecified Vulnerabilities
OID:1.3.6.1.4.1.25623.1.0.100537
Version used: $Revision: 5144 $

Product Detection Result


Product: cpe:/a:tiki:tikiwiki_cms/groupware:1.9.5
Method: Tiki Wiki CMS Groupware Version Detection
OID: 1.3.6.1.4.1.25623.1.0.901001)

References
CVE: CVE-2010-1135, CVE-2010-1134, CVE-2010-1133, CVE-2010-1136
BID:38608
Other:
URL:http://www.securityfocus.com/bid/38608
URL:http://tikiwiki.svn.sourceforge.net/viewvc/tikiwiki?view=rev&revision=247
,→34
URL:http://tikiwiki.svn.sourceforge.net/viewvc/tikiwiki?view=rev&revision=250
,→46
URL:http://tikiwiki.svn.sourceforge.net/viewvc/tikiwiki?view=rev&revision=254
,→24
URL:http://tikiwiki.svn.sourceforge.net/viewvc/tikiwiki?view=rev&revision=254
,→35
URL:http://info.tikiwiki.org/article86-Tiki-Announces-3-5-and-4-2-Releases
URL:http://info.tikiwiki.org/tiki-index.php?page=homepage
2 RESULTS PER HOST 11

High (CVSS: 7.5)


NVT: Test HTTP dangerous methods

Summary
Miscongured web servers allows remote clients to perform dangerous HTTP methods such as
PUT and DELETE. This script checks if they are enabled and can be misused to upload or
delete les.

Vulnerability Detection Result


We could upload the following files via the PUT method at this web server:
http://192.168.87.129/dav/puttest2008710493.html
We could delete the following files via the DELETE method at this web server:
http://192.168.87.129/dav/puttest2008710493.html

Impact
- Enabled PUT method: This might allow an attacker to upload and run arbitrary code on this
web server.
- Enabled DELETE method: This might allow an attacker to delete additional les on this web
server.

Solution
Solution type: Mitigation
Use access restrictions to these dangerous HTTP methods or disable them completely.

Vulnerability Detection Method


Details: Test HTTP dangerous methods
OID:1.3.6.1.4.1.25623.1.0.10498
Version used: $Revision: 9335 $

References
BID:12141
Other:
OWASP:OWASP-CM-001

High (CVSS: 7.5)


NVT: PHP-CGI-based setups vulnerability when parsing query string parameters from php les.

Summary
PHP is prone to an information-disclosure vulnerability.

Vulnerability Detection Result


Vulnerable url: http://192.168.87.129/cgi-bin/php

Impact
Exploiting this issue allows remote attackers to view the source code of les in the context of the
server process. This may allow the attacker to obtain sensitive information and to run arbitrary
PHP code on the aected computer. Other attacks are also possible.
. . . continues on next page . . .
2 RESULTS PER HOST 12

. . . continued from previous page . . .

Solution
Solution type: VendorFix
PHP has released version 5.4.3 and 5.3.13 to address this vulnerability. PHP is recommending
that users upgrade to the latest version of PHP.

Vulnerability Insight
When PHP is used in a CGI-based setup (such as Apache's mod_cgid), the php-cgi receives
a processed query string parameter as command line arguments which allows command-line
switches, such as -s, -d or -c to be passed to the php-cgi binary, which can be exploited to
disclose source code and obtain arbitrary code execution.
An example of the -s command, allowing an attacker to view the source code of index.php is
below:
http://example.com/index.php?-s

Vulnerability Detection Method


Details: PHP-CGI-based setups vulnerability when parsing query string parameters from ph.
,→..
OID:1.3.6.1.4.1.25623.1.0.103482
Version used: $Revision: 13679 $

References
CVE: CVE-2012-1823, CVE-2012-2311, CVE-2012-2336, CVE-2012-2335
BID:53388
Other:
URL:http://www.h-online.com/open/news/item/Critical-open-hole-in-PHP-creates-r
,→isks-Update-1567532.html
URL:http://www.kb.cert.org/vuls/id/520827
URL:http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/
URL:https://bugs.php.net/bug.php?id=61910
URL:http://www.php.net/manual/en/security.cgi-bin.php
URL:http://www.securityfocus.com/bid/53388

[ return to 192.168.87.129 ]

2.1.7 High 1099/tcp

High (CVSS: 10.0)


NVT: Java RMI Server Insecure Default Conguration Remote Code Execution Vulnerability

Summary
Multiple Java products that implement the RMI Server contain a vulnerability that could allow
an unauthenticated, remote attacker to execute arbitrary code on a targeted system with elevated
privileges.

Vulnerability Detection Result


. . . continues on next page . . .
2 RESULTS PER HOST 13

. . . continued from previous page . . .


Vulnerability was detected according to the Vulnerability Detection Method.

Solution
Solution type: Workaround
Disable class-loading.

Vulnerability Insight
The vulnerability exists because of an incorrect default conguration of the Remote Method
Invocation (RMI) Server in the aected software. An unauthenticated, remote attacker could
exploit the vulnerability by transmitting crafted packets to the aected software. When the
packets are processed, the attacker could execute arbitrary code on the system with elevated
privileges.

Vulnerability Detection Method


Check if the target tries to load a Java class via a remote HTTP URL.
Details: Java RMI Server Insecure Default Configuration Remote Code Execution Vulnerabil.
,→..
OID:1.3.6.1.4.1.25623.1.0.140051
Version used: $Revision: 11922 $

References
Other:
URL:https://tools.cisco.com/security/center/viewAlert.x?alertId=23665

[ return to 192.168.87.129 ]

2.1.8 High 22/tcp

High (CVSS: 7.5)


NVT: SSH Brute Force Logins With Default Credentials Reporting

Summary
It was possible to login into the remote SSH server using default credentials.
As the NVT 'SSH Brute Force Logins with default Credentials' (OID:
1.3.6.1.4.1.25623.1.0.108013) might run into a timeout the actual reporting of this vulner-
ability takes place in this NVT instead. The script preference 'Report timeout' allows you to
congure if such an timeout is reported.

Vulnerability Detection Result


It was possible to login with the following credentials <User>:<Password>
msfadmin:msfadmin
user:user

Solution
Solution type: Mitigation
Change the password as soon as possible.
. . . continues on next page . . .
2 RESULTS PER HOST 14

. . . continued from previous page . . .

Vulnerability Detection Method


Try to login with a number of known default credentials via the SSH protocol.
Details: SSH Brute Force Logins With Default Credentials Reporting
OID:1.3.6.1.4.1.25623.1.0.103239
Version used: $Revision: 13568 $

[ return to 192.168.87.129 ]

2.1.9 High 21/tcp

High (CVSS: 7.5)


NVT: vsftpd Compromised Source Packages Backdoor Vulnerability

Summary
vsftpd is prone to a backdoor vulnerability.

Vulnerability Detection Result


Vulnerability was detected according to the Vulnerability Detection Method.

Impact
Attackers can exploit this issue to execute arbitrary commands in the context of the application.
Successful attacks will compromise the aected application.

Solution
Solution type: VendorFix
The repaired package can be downloaded from the referenced link. Please validate the package
with its signature.

Aected Software/OS
The vsftpd 2.3.4 source package is aected.

Vulnerability Detection Method


Details: vsftpd Compromised Source Packages Backdoor Vulnerability
OID:1.3.6.1.4.1.25623.1.0.103185
Version used: $Revision: 12076 $

References
BID:48539
Other:
URL:http://www.securityfocus.com/bid/48539
URL:http://scarybeastsecurity.blogspot.com/2011/07/alert-vsftpd-download-back
,→doored.html
URL:https://security.appspot.com/vsftpd.html

[ return to 192.168.87.129 ]
2 RESULTS PER HOST 15

2.1.10 High 512/tcp

High (CVSS: 10.0)


NVT: rexec Passwordless / Unencrypted Cleartext Login

Summary
This remote host is running a rexec service.

Vulnerability Detection Result


The rexec service is not allowing connections from this host.

Solution
Solution type: Mitigation
Disable the rexec service and use alternatives like SSH instead.

Vulnerability Insight
rexec (Remote Process Execution) has the same kind of functionality that rsh has: you can
execute shell commands on a remote computer.
The main dierence is that rexec authenticate by reading the username and password *unen-
crypted* from the socket.

Vulnerability Detection Method


Details: rexec Passwordless / Unencrypted Cleartext Login
OID:1.3.6.1.4.1.25623.1.0.100111
Version used: $Revision: 13541 $

References
Other:
URL:https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0618

[ return to 192.168.87.129 ]

2.1.11 High 5900/tcp

High (CVSS: 9.0)


NVT: VNC Brute Force Login

Summary
Try to log in with given passwords via VNC protocol.

Vulnerability Detection Result


It was possible to connect to the VNC server with the password: password

Solution
Solution type: Mitigation
Change the password to something hard to guess or enable password protection at all.
. . . continues on next page . . .
2 RESULTS PER HOST 16

. . . continued from previous page . . .

Vulnerability Insight
This script tries to authenticate to a VNC server with the passwords set in the password prefer-
ence. It will also test and report if no authentication / password is required at all.
Note: Some VNC servers have a blacklisting scheme that blocks IP addresses after ve unsuc-
cessful connection attempts for a period of time. The script will abort the brute force attack if
it encounters that it gets blocked.
Note as well that passwords can be max. 8 characters long.

Vulnerability Detection Method


Details: VNC Brute Force Login
OID:1.3.6.1.4.1.25623.1.0.106056
Version used: $Revision: 13328 $

[ return to 192.168.87.129 ]

2.1.12 High 513/tcp

High (CVSS: 7.5)


NVT: rlogin Passwordless / Unencrypted Cleartext Login

Summary
This remote host is running a rlogin service.

Vulnerability Detection Result


The service is misconfigured so it is allowing conntections without a password.

Solution
Solution type: Mitigation
Disable the rlogin service and use alternatives like SSH instead.

Vulnerability Insight
rlogin has several serious security problems,
- all information, including passwords, is transmitted unencrypted.
- .rlogin (or .rhosts) le is easy to misuse (potentially allowing anyone to login without a password)

Vulnerability Detection Method


Details: rlogin Passwordless / Unencrypted Cleartext Login
OID:1.3.6.1.4.1.25623.1.0.901202
Version used: $Revision: 13541 $

References
Other:
URL:https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0651
URL:http://en.wikipedia.org/wiki/Rlogin
URL:http://www.ietf.org/rfc/rfc1282.txt
2 RESULTS PER HOST 17

[ return to 192.168.87.129 ]

2.1.13 High 3632/tcp

High (CVSS: 9.3)


NVT: DistCC Remote Code Execution Vulnerability

Summary
DistCC 2.x, as used in XCode 1.5 and others, when not congured to restrict access to the server
port, allows remote attackers to execute arbitrary commands via compilation jobs, which are
executed by the server without authorization checks.

Vulnerability Detection Result


It was possible to execute the "id" command.
Result: uid=1(daemon) gid=1(daemon)

Impact
DistCC by default trusts its clients completely that in turn could allow a malicious client to
execute arbitrary commands on the server.

Solution
Solution type: VendorFix
Vendor updates are available. Please see the references for more information.
For more information about DistCC's security see the references.

Vulnerability Detection Method


Details: DistCC Remote Code Execution Vulnerability
OID:1.3.6.1.4.1.25623.1.0.103553
Version used: $Revision: 12032 $

References
CVE: CVE-2004-2687
Other:
URL:https://distcc.github.io/security.html
URL:https://web.archive.org/web/20150511045306/http://archives.neohapsis.com:
,→80/archives/bugtraq/2005-03/0183.html

[ return to 192.168.87.129 ]

2.1.14 High 5432/tcp

High (CVSS: 9.0)


NVT: PostgreSQL weak password

Product detection result


cpe:/a:postgresql:postgresql:8.3.1
. . . continues on next page . . .
2 RESULTS PER HOST 18

. . . continued from previous page . . .


Detected by PostgreSQL Detection (OID: 1.3.6.1.4.1.25623.1.0.100151)

Summary
It was possible to login into the remote PostgreSQL as user postgres using weak credentials.

Vulnerability Detection Result


It was possible to login as user postgres with password "postgres".

Solution
Solution type: Mitigation
Change the password as soon as possible.

Vulnerability Detection Method


Details: PostgreSQL weak password
OID:1.3.6.1.4.1.25623.1.0.103552
Version used: $Revision: 10312 $

Product Detection Result


Product: cpe:/a:postgresql:postgresql:8.3.1
Method: PostgreSQL Detection
OID: 1.3.6.1.4.1.25623.1.0.100151)

[ return to 192.168.87.129 ]

2.1.15 High 8787/tcp

High (CVSS: 10.0)


NVT: Distributed Ruby (dRuby/DRb) Multiple Remote Code Execution Vulnerabilities

Summary
Systems using Distributed Ruby (dRuby/DRb), which is available in Ruby versions 1.6 and later,
may permit unauthorized systems to execute distributed commands.

Vulnerability Detection Result


The service is running in $SAFE >= 1 mode. However it is still possible to run a
,→rbitrary syscall commands on the remote host. Sending an invalid syscall the s
,→ervice returned the following response:
Flo:Errno::ENOSYS:bt["3/usr/lib/ruby/1.8/drb/drb.rb:1555:in `syscall'"0/usr/lib/
,→ruby/1.8/drb/drb.rb:1555:in `send'"4/usr/lib/ruby/1.8/drb/drb.rb:1555:in `__se
,→nd__'"A/usr/lib/ruby/1.8/drb/drb.rb:1555:in `perform_without_block'"3/usr/lib/
,→ruby/1.8/drb/drb.rb:1515:in `perform'"5/usr/lib/ruby/1.8/drb/drb.rb:1589:in `m
,→ain_loop'"0/usr/lib/ruby/1.8/drb/drb.rb:1585:in `loop'"5/usr/lib/ruby/1.8/drb/
,→drb.rb:1585:in `main_loop'"1/usr/lib/ruby/1.8/drb/drb.rb:1581:in `start'"5/usr
,→/lib/ruby/1.8/drb/drb.rb:1581:in `main_loop'"//usr/lib/ruby/1.8/drb/drb.rb:143
,→0:in `run'"1/usr/lib/ruby/1.8/drb/drb.rb:1427:in `start'"//usr/lib/ruby/1.8/dr
. . . continues on next page . . .
2 RESULTS PER HOST 19

. . . continued from previous page . . .


,→b/drb.rb:1427:in `run'"6/usr/lib/ruby/1.8/drb/drb.rb:1347:in `initialize'"//us
,→r/lib/ruby/1.8/drb/drb.rb:1627:in `new'"9/usr/lib/ruby/1.8/drb/drb.rb:1627:in
,→`start_service'"%/usr/sbin/druby_timeserver.rb:12:errnoi+:mesg"Function not im
,→plemented

Impact
By default, Distributed Ruby does not impose restrictions on allowed hosts or set the $SAFE
environment variable to prevent privileged activities. If other controls are not in place, especially
if the Distributed Ruby process runs with elevated privileges, an attacker could execute arbitrary
system commands or Ruby scripts on the Distributed Ruby server. An attacker may need to
know only the URI of the listening Distributed Ruby server to submit Ruby commands.

Solution
Solution type: Mitigation
Administrators of environments that rely on Distributed Ruby should ensure that appropriate
controls are in place. Code-level controls may include:
- Implementing taint on untrusted input
- Setting $SAFE levels appropriately (>=2 is recommended if untrusted hosts are allowed to
submit Ruby commands, and >=3 may be appropriate)
- Including drb/acl.rb to set ACLEntry to restrict access to trusted hosts

Vulnerability Detection Method


Send a crafted command to the service and check for a remote command execution via the
instance_eval or syscall requests.
Details: Distributed Ruby (dRuby/DRb) Multiple Remote Code Execution Vulnerabilities
OID:1.3.6.1.4.1.25623.1.0.108010
Version used: $Revision: 12338 $

References
BID:47071
Other:
URL:https://tools.cisco.com/security/center/viewAlert.x?alertId=22750
URL:http://www.securityfocus.com/bid/47071
URL:http://blog.recurity-labs.com/archives/2011/05/12/druby_for_penetration_t
,→esters/
URL:http://www.ruby-doc.org/stdlib-1.9.3/libdoc/drb/rdoc/DRb.html

[ return to 192.168.87.129 ]

2.1.16 High general/tcp

High (CVSS: 10.0)


NVT: OS End Of Life Detection

Product detection result


cpe:/o:canonical:ubuntu_linux:8.04
. . . continues on next page . . .
2 RESULTS PER HOST 20

. . . continued from previous page . . .


Detected by OS Detection Consolidation and Reporting (OID: 1.3.6.1.4.1.25623.1.0
,→.105937)

Summary
OS End Of Life Detection
The Operating System on the remote host has reached the end of life and should not be used
anymore.

Vulnerability Detection Result


The "Ubuntu" Operating System on the remote host has reached the end of life.
CPE: cpe:/o:canonical:ubuntu_linux:8.04
Installed version,
build or SP: 8.04
EOL date: 2013-05-09
EOL info: https://wiki.ubuntu.com/Releases

Solution
Solution type: Mitigation

Vulnerability Detection Method


Details: OS End Of Life Detection
OID:1.3.6.1.4.1.25623.1.0.103674
Version used: $Revision: 8927 $

Product Detection Result


Product: cpe:/o:canonical:ubuntu_linux:8.04
Method: OS Detection Consolidation and Reporting
OID: 1.3.6.1.4.1.25623.1.0.105937)

[ return to 192.168.87.129 ]

2.1.17 Medium 6667/tcp

Medium (CVSS: 6.8)


NVT: UnrealIRCd Authentication Spoong Vulnerability

Product detection result


cpe:/a:unrealircd:unrealircd:3.2.8.1
Detected by UnrealIRCd Detection (OID: 1.3.6.1.4.1.25623.1.0.809884)

Summary
This host is installed with UnrealIRCd and is prone to authentication spoong vulnerability.

Vulnerability Detection Result


. . . continues on next page . . .
2 RESULTS PER HOST 21

. . . continued from previous page . . .


Installed version: 3.2.8.1
Fixed version: 3.2.10.7

Impact
Successful exploitation of this vulnerability will allows remote attackers to spoof certicate n-
gerprints and consequently log in as another user.

Solution
Solution type: VendorFix
Upgrade to UnrealIRCd 3.2.10.7, or 4.0.6, or later.

Aected Software/OS
UnrealIRCd before 3.2.10.7 and 4.x before 4.0.6.

Vulnerability Insight
The aw exists due to an error in the 'm_authenticate' function in 'modules/m_sasl.c' script.

Vulnerability Detection Method


Checks if a vulnerable version is present on the target host.
Details: UnrealIRCd Authentication Spoofing Vulnerability
OID:1.3.6.1.4.1.25623.1.0.809883
Version used: $Revision: 11874 $

Product Detection Result


Product: cpe:/a:unrealircd:unrealircd:3.2.8.1
Method: UnrealIRCd Detection
OID: 1.3.6.1.4.1.25623.1.0.809884)

References
CVE: CVE-2016-7144
BID:92763
Other:
URL:http://seclists.org/oss-sec/2016/q3/420
URL:http://www.openwall.com/lists/oss-security/2016/09/05/8
URL:https://github.com/unrealircd/unrealircd/commit/f473e355e1dc422c4f019dbf8
,→6bc50ba1a34a766
URL:https://bugs.unrealircd.org/main_page.php

[ return to 192.168.87.129 ]

2.1.18 Medium 80/tcp

Medium (CVSS: 6.8)


NVT: TWiki Cross-Site Request Forgery Vulnerability - Sep10

. . . continues on next page . . .


2 RESULTS PER HOST 22

. . . continued from previous page . . .


Product detection result
cpe:/a:twiki:twiki:01.Feb.2003
Detected by TWiki Version Detection (OID: 1.3.6.1.4.1.25623.1.0.800399)

Summary
The host is running TWiki and is prone to Cross-Site Request Forgery vulnerability.

Vulnerability Detection Result


Installed version: 01.Feb.2003
Fixed version: 4.3.2

Impact
Successful exploitation will allow attacker to gain administrative privileges on the target appli-
cation and can cause CSRF attack.

Solution
Solution type: VendorFix
Upgrade to TWiki version 4.3.2 or later.

Aected Software/OS
TWiki version prior to 4.3.2

Vulnerability Insight
Attack can be done by tricking an authenticated TWiki user into visiting a static HTML page on
another side, where a Javascript enabled browser will send an HTTP POST request to TWiki,
which in turn will process the request as the TWiki user.

Vulnerability Detection Method


Details: TWiki Cross-Site Request Forgery Vulnerability - Sep10
OID:1.3.6.1.4.1.25623.1.0.801281
Version used: $Revision: 12952 $

Product Detection Result


Product: cpe:/a:twiki:twiki:01.Feb.2003
Method: TWiki Version Detection
OID: 1.3.6.1.4.1.25623.1.0.800399)

References
CVE: CVE-2009-4898
Other:
URL:http://www.openwall.com/lists/oss-security/2010/08/03/8
URL:http://www.openwall.com/lists/oss-security/2010/08/02/17
URL:http://twiki.org/cgi-bin/view/Codev/SecurityAuditTokenBasedCsrfFix
URL:http://twiki.org/cgi-bin/view/Codev/DownloadTWiki
2 RESULTS PER HOST 23

Medium (CVSS: 6.5)


NVT: Tiki Wiki CMS Groupware < 17.2 SQL Injection Vulnerability

Product detection result


cpe:/a:tiki:tikiwiki_cms/groupware:1.9.5
Detected by Tiki Wiki CMS Groupware Version Detection (OID: 1.3.6.1.4.1.25623.1.
,→0.901001)

Summary
In Tiki the user task component is vulnerable to a SQL Injection via the tiki-user_tasks.php
show_history parameter.

Vulnerability Detection Result


Installed version: 1.9.5
Fixed version: 17.2

Solution
Solution type: VendorFix
Upgrade to version 17.2 or later.

Aected Software/OS
Tiki Wiki CMS Groupware prior to version 17.2.

Vulnerability Detection Method


Checks if a vulnerable version is present on the target host.
Details: Tiki Wiki CMS Groupware < 17.2 SQL Injection Vulnerability
OID:1.3.6.1.4.1.25623.1.0.141885
Version used: $Revision: 13115 $

Product Detection Result


Product: cpe:/a:tiki:tikiwiki_cms/groupware:1.9.5
Method: Tiki Wiki CMS Groupware Version Detection
OID: 1.3.6.1.4.1.25623.1.0.901001)

References
CVE: CVE-2018-20719
Other:
URL:https://blog.ripstech.com/2018/scan-verify-patch-security-issues-in-minute
,→s/

Medium (CVSS: 6.0)


NVT: TWiki Cross-Site Request Forgery Vulnerability

Product detection result


cpe:/a:twiki:twiki:01.Feb.2003
. . . continues on next page . . .
2 RESULTS PER HOST 24

. . . continued from previous page . . .


Detected by TWiki Version Detection (OID: 1.3.6.1.4.1.25623.1.0.800399)

Summary
The host is running TWiki and is prone to Cross-Site Request Forgery Vulnerability.

Vulnerability Detection Result


Installed version: 01.Feb.2003
Fixed version: 4.3.1

Impact
Successful exploitation will allow attacker to gain administrative privileges on the target appli-
cation and can cause CSRF attack.

Solution
Solution type: VendorFix
Upgrade to version 4.3.1 or later.

Aected Software/OS
TWiki version prior to 4.3.1

Vulnerability Insight
Remote authenticated user can create a specially crafted image tag that, when viewed by the
target user, will update pages on the target system with the privileges of the target user via
HTTP requests.

Vulnerability Detection Method


Details: TWiki Cross-Site Request Forgery Vulnerability
OID:1.3.6.1.4.1.25623.1.0.800400
Version used: $Revision: 12952 $

Product Detection Result


Product: cpe:/a:twiki:twiki:01.Feb.2003
Method: TWiki Version Detection
OID: 1.3.6.1.4.1.25623.1.0.800399)

References
CVE: CVE-2009-1339
Other:
URL:http://secunia.com/advisories/34880
URL:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526258
URL:http://twiki.org/p/pub/Codev/SecurityAlert-CVE-2009-1339/TWiki-4.3.0-c-di
,→ff-cve-2009-1339.txt
2 RESULTS PER HOST 25

Medium (CVSS: 5.8)


NVT: HTTP Debugging Methods (TRACE/TRACK) Enabled

Summary
Debugging functions are enabled on the remote web server.
The remote web server supports the TRACE and/or TRACK methods. TRACE and TRACK
are HTTP methods which are used to debug web server connections.

Vulnerability Detection Result


The web server has the following HTTP methods enabled: TRACE

Impact
An attacker may use this aw to trick your legitimate web users to give him their credentials.

Solution
Solution type: Mitigation
Disable the TRACE and TRACK methods in your web server conguration.
Please see the manual of your web server or the references for more information.

Aected Software/OS
Web servers with enabled TRACE and/or TRACK methods.

Vulnerability Insight
It has been shown that web servers supporting this methods are subject to cross-site-scripting
attacks, dubbed XST for Cross-Site-Tracing, when used in conjunction with various weaknesses
in browsers.

Vulnerability Detection Method


Details: HTTP Debugging Methods (TRACE/TRACK) Enabled
OID:1.3.6.1.4.1.25623.1.0.11213
Version used: $Revision: 10828 $

References
CVE: CVE-2003-1567, CVE-2004-2320, CVE-2004-2763, CVE-2005-3398, CVE-2006-4683,
,→CVE-2007-3008, CVE-2008-7253, CVE-2009-2823, CVE-2010-0386, CVE-2012-2223, CVE
,→-2014-7883
BID:9506, 9561, 11604, 15222, 19915, 24456, 33374, 36956, 36990, 37995
Other:
URL:http://www.kb.cert.org/vuls/id/288308
URL:http://www.kb.cert.org/vuls/id/867593
URL:http://httpd.apache.org/docs/current/de/mod/core.html#traceenable
URL:https://www.owasp.org/index.php/Cross_Site_Tracing

Medium (CVSS: 5.0)


NVT: /doc directory browsable

Summary
. . . continues on next page . . .
2 RESULTS PER HOST 26

. . . continued from previous page . . .


The /doc directory is browsable. /doc shows the content of the /usr/doc directory and therefore
it shows which programs and - important! - the version of the installed programs.

Vulnerability Detection Result


Vulnerable url: http://192.168.87.129/doc/

Solution
Solution type: Mitigation
Use access restrictions for the /doc directory. If you use Apache you might use this in your
access.conf:
<Directory /usr/doc> AllowOverride None order deny,allow deny from all allow from localhost
</Directory>

Vulnerability Detection Method


Details: /doc directory browsable
OID:1.3.6.1.4.1.25623.1.0.10056
Version used: $Revision: 4288 $

References
CVE: CVE-1999-0678
BID:318

Medium (CVSS: 5.0)


NVT: Tiki Wiki CMS Groupware 'xedURLData' Local File Inclusion Vulnerability

Product detection result


cpe:/a:tiki:tikiwiki_cms/groupware:1.9.5
Detected by Tiki Wiki CMS Groupware Version Detection (OID: 1.3.6.1.4.1.25623.1.
,→0.901001)

Summary
The host is installed with Tiki Wiki CMS Groupware and is prone to a local le inclusion
vulnerability.

Vulnerability Detection Result


Installed version: 1.9.5
Fixed version: 12.11

Impact
Successful exploitation will allow an user having access to the admin backend to gain access to
arbitrary les and to compromise the application.

Solution
Solution type: VendorFix
Upgrade to Tiki Wiki CMS Groupware version 12.11 LTS, 15.4 or later.
. . . continues on next page . . .
2 RESULTS PER HOST 27

. . . continued from previous page . . .

Aected Software/OS
Tiki Wiki CMS Groupware versions:
- below 12.11 LTS
- 13.x, 14.x and 15.x below 15.4

Vulnerability Insight
The Flaw is due to improper sanitization of input passed to the 'xedURLData' parameter of
the 'display_banner.php' script.

Vulnerability Detection Method


Checks if a vulnerable version is present on the target host.
Details: Tiki Wiki CMS Groupware 'fixedURLData' Local File Inclusion Vulnerability
OID:1.3.6.1.4.1.25623.1.0.108064
Version used: $Revision: 11863 $

Product Detection Result


Product: cpe:/a:tiki:tikiwiki_cms/groupware:1.9.5
Method: Tiki Wiki CMS Groupware Version Detection
OID: 1.3.6.1.4.1.25623.1.0.901001)

References
CVE: CVE-2016-10143
Other:
URL:http://tiki.org/article445-Security-updates-Tiki-16-2-15-4-and-Tiki-12-11-
,→released
URL:https://sourceforge.net/p/tikiwiki/code/60308/
URL:https://tiki.org

Medium (CVSS: 5.0)


NVT: TWiki < 6.1.0 XSS Vulnerability

Product detection result


cpe:/a:twiki:twiki:01.Feb.2003
Detected by TWiki Version Detection (OID: 1.3.6.1.4.1.25623.1.0.800399)

Summary
bin/statistics in TWiki 6.0.2 allows XSS via the webs parameter.

Vulnerability Detection Result


Installed version: 01.Feb.2003
Fixed version: 6.1.0

Solution
Solution type: VendorFix
. . . continues on next page . . .
2 RESULTS PER HOST 28

. . . continued from previous page . . .


Update to version 6.1.0 or later.

Aected Software/OS
TWiki version 6.0.2 and probably prior.

Vulnerability Detection Method


Checks if a vulnerable version is present on the target host.
Details: TWiki < 6.1.0 XSS Vulnerability
OID:1.3.6.1.4.1.25623.1.0.141830
Version used: $Revision: 12952 $

Product Detection Result


Product: cpe:/a:twiki:twiki:01.Feb.2003
Method: TWiki Version Detection
OID: 1.3.6.1.4.1.25623.1.0.800399)

References
CVE: CVE-2018-20212
Other:
URL:https://seclists.org/fulldisclosure/2019/Jan/7
URL:http://twiki.org/cgi-bin/view/Codev/DownloadTWiki

Medium (CVSS: 5.0)


NVT: Tiki Wiki CMS Groupware Input Sanitation Weakness Vulnerability

Product detection result


cpe:/a:tiki:tikiwiki_cms/groupware:1.9.5
Detected by Tiki Wiki CMS Groupware Version Detection (OID: 1.3.6.1.4.1.25623.1.
,→0.901001)

Summary
The host is installed with Tiki Wiki CMS Groupware and is prone to input sanitation weakness
vulnerability.

Vulnerability Detection Result


Installed version: 1.9.5
Fixed version: 2.2

Impact
Successful exploitation could allow arbitrary code execution in the context of an aected site.
Impact Level: Application

Solution
Solution type: VendorFix
. . . continues on next page . . .
2 RESULTS PER HOST 29

. . . continued from previous page . . .


Upgrade to version 2.2 or latest http://info.tikiwiki.org/tiki-index.php?page=Get+Tiki&bl

Aected Software/OS
Tiki Wiki CMS Groupware version prior to 2.2 on all running platform

Vulnerability Insight
The vulnerability is due to input validation error in tiki-error.php which fails to sanitise before
being returned to the user.

Vulnerability Detection Method


Details: Tiki Wiki CMS Groupware Input Sanitation Weakness Vulnerability
OID:1.3.6.1.4.1.25623.1.0.800315
Version used: $Revision: 5144 $

Product Detection Result


Product: cpe:/a:tiki:tikiwiki_cms/groupware:1.9.5
Method: Tiki Wiki CMS Groupware Version Detection
OID: 1.3.6.1.4.1.25623.1.0.901001)

References
CVE: CVE-2008-5318, CVE-2008-5319
Other:
URL:http://secunia.com/advisories/32341
URL:http://info.tikiwiki.org/tiki-read_article.php?articleId=41

Medium (CVSS: 5.0)


NVT: awiki Multiple Local File Include Vulnerabilities

Summary
awiki is prone to multiple local le-include vulnerabilities because it fails to properly sanitize
user-supplied input.

Vulnerability Detection Result


Vulnerable url: http://192.168.87.129/mutillidae/index.php?page=/etc/passwd

Impact
An attacker can exploit this vulnerability to obtain potentially sensitive information and execute
arbitrary local scripts in the context of the webserver process. This may allow the attacker to
compromise the application and the host. Other attacks are also possible.

Solution
Solution type: WillNotFix
No known solution was made available for at least one year since the disclosure of this vulnera-
bility. Likely none will be provided anymore. General solution options are to upgrade to a newer
release, disable respective features, remove the product or replace the product by another one.
. . . continues on next page . . .
2 RESULTS PER HOST 30

. . . continued from previous page . . .

Aected Software/OS
awiki 20100125 is vulnerable. Other versions may also be aected.

Vulnerability Detection Method


Details: awiki Multiple Local File Include Vulnerabilities
OID:1.3.6.1.4.1.25623.1.0.103210
Version used: $Revision: 10741 $

References
BID:49187
Other:
URL:https://www.exploit-db.com/exploits/36047/
URL:http://www.securityfocus.com/bid/49187
URL:http://www.kobaonline.com/awiki/

Medium (CVSS: 4.8)


NVT: Cleartext Transmission of Sensitive Information via HTTP

Summary
The host / application transmits sensitive information (username, passwords) in cleartext via
HTTP.

Vulnerability Detection Result


The following input fields where identified (URL:input name):
http://192.168.87.129/phpMyAdmin/:pma_password
http://192.168.87.129/phpMyAdmin/?D=A:pma_password
http://192.168.87.129/tikiwiki/tiki-install.php:pass
http://192.168.87.129/twiki/bin/view/TWiki/TWikiUserAuthentication:oldpassword

Impact
An attacker could use this situation to compromise or eavesdrop on the HTTP communication
between the client and the server using a man-in-the-middle attack to get access to sensitive data
like usernames or passwords.

Solution
Solution type: Workaround
Enforce the transmission of sensitive data via an encrypted SSL/TLS connection. Additionally
make sure the host / application is redirecting all users to the secured SSL/TLS connection
before allowing to input sensitive data into the mentioned functions.

Aected Software/OS
Hosts / applications which doesn't enforce the transmission of sensitive data via an encrypted
SSL/TLS connection.

Vulnerability Detection Method


. . . continues on next page . . .
2 RESULTS PER HOST 31

. . . continued from previous page . . .


Evaluate previous collected information and check if the host / application is not enforcing the
transmission of sensitive data via an encrypted SSL/TLS connection.
The script is currently checking the following:
- HTTP Basic Authentication (Basic Auth)
- HTTP Forms (e.g. Login) with input eld of type 'password'
Details: Cleartext Transmission of Sensitive Information via HTTP
OID:1.3.6.1.4.1.25623.1.0.108440
Version used: $Revision: 10726 $

References
Other:
URL:https://www.owasp.org/index.php/Top_10_2013-A2-Broken_Authentication_and_S
,→ession_Management
URL:https://www.owasp.org/index.php/Top_10_2013-A6-Sensitive_Data_Exposure
URL:https://cwe.mitre.org/data/definitions/319.html

Medium (CVSS: 4.3)


NVT: phpMyAdmin 'error.php' Cross Site Scripting Vulnerability

Product detection result


cpe:/a:phpmyadmin:phpmyadmin:3.1.1
Detected by phpMyAdmin Detection (OID: 1.3.6.1.4.1.25623.1.0.900129)

Summary
The host is running phpMyAdmin and is prone to Cross-Site Scripting Vulnerability.

Vulnerability Detection Result


Vulnerability was detected according to the Vulnerability Detection Method.

Impact
Successful exploitation will allow attackers to inject arbitrary HTML code within the error page
and conduct phishing attacks.

Solution
Solution type: WillNotFix
No known solution was made available for at least one year since the disclosure of this vulnera-
bility. Likely none will be provided anymore. General solution options are to upgrade to a newer
release, disable respective features, remove the product or replace the product by another one.

Aected Software/OS
phpMyAdmin version 3.3.8.1 and prior.

Vulnerability Insight
. . . continues on next page . . .
2 RESULTS PER HOST 32

. . . continued from previous page . . .


The aw is caused by input validation errors in the 'error.php' script when processing crafted
BBcode tags containing '@' characters, which could allow attackers to inject arbitrary HTML
code within the error page and conduct phishing attacks.

Vulnerability Detection Method


Details: phpMyAdmin 'error.php' Cross Site Scripting Vulnerability
OID:1.3.6.1.4.1.25623.1.0.801660
Version used: $Revision: 11553 $

Product Detection Result


Product: cpe:/a:phpmyadmin:phpmyadmin:3.1.1
Method: phpMyAdmin Detection
OID: 1.3.6.1.4.1.25623.1.0.900129)

References
CVE: CVE-2010-4480
Other:
URL:http://www.exploit-db.com/exploits/15699/
URL:http://www.vupen.com/english/advisories/2010/3133

Medium (CVSS: 4.3)


NVT: Apache HTTP Server 'httpOnly' Cookie Information Disclosure Vulnerability

Summary
This host is running Apache HTTP Server and is prone to cookie information disclosure vulner-
ability.

Vulnerability Detection Result


Vulnerability was detected according to the Vulnerability Detection Method.

Impact
Successful exploitation will allow attackers to obtain sensitive information that may aid in further
attacks.

Solution
Solution type: VendorFix
Upgrade to Apache HTTP Server version 2.2.22 or later.

Aected Software/OS
Apache HTTP Server versions 2.2.0 through 2.2.21

Vulnerability Insight
The aw is due to an error within the default error response for status code 400 when no custom
ErrorDocument is congured, which can be exploited to expose 'httpOnly' cookies.

. . . continues on next page . . .


2 RESULTS PER HOST 33

. . . continued from previous page . . .


Vulnerability Detection Method
Details: Apache HTTP Server 'httpOnly' Cookie Information Disclosure Vulnerability
OID:1.3.6.1.4.1.25623.1.0.902830
Version used: $Revision: 11857 $

References
CVE: CVE-2012-0053
BID:51706
Other:
URL:http://secunia.com/advisories/47779
URL:http://www.exploit-db.com/exploits/18442
URL:http://rhn.redhat.com/errata/RHSA-2012-0128.html
URL:http://httpd.apache.org/security/vulnerabilities_22.html
URL:http://svn.apache.org/viewvc?view=revision&revision=1235454
URL:http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00026.htm
,→l

[ return to 192.168.87.129 ]

2.1.19 Medium 23/tcp

Medium (CVSS: 4.8)


NVT: Telnet Unencrypted Cleartext Login

Summary
The remote host is running a Telnet service that allows cleartext logins over unencrypted con-
nections.

Vulnerability Detection Result


Vulnerability was detected according to the Vulnerability Detection Method.

Impact
An attacker can uncover login names and passwords by sning trac to the Telnet service.

Solution
Solution type: Mitigation
Replace Telnet with a protocol like SSH which supports encrypted connections.

Vulnerability Detection Method


Details: Telnet Unencrypted Cleartext Login
OID:1.3.6.1.4.1.25623.1.0.108522
Version used: $Revision: 13620 $

[ return to 192.168.87.129 ]
2 RESULTS PER HOST 34

2.1.20 Medium 22/tcp

Medium (CVSS: 4.3)


NVT: SSH Weak Encryption Algorithms Supported

Summary
The remote SSH server is congured to allow weak encryption algorithms.

Vulnerability Detection Result


The following weak client-to-server encryption algorithms are supported by the r
,→emote service:
3des-cbc
aes128-cbc
aes192-cbc
aes256-cbc
arcfour
arcfour128
arcfour256
blowfish-cbc
cast128-cbc
rijndael-cbc@lysator.liu.se
The following weak server-to-client encryption algorithms are supported by the r
,→emote service:
3des-cbc
aes128-cbc
aes192-cbc
aes256-cbc
arcfour
arcfour128
arcfour256
blowfish-cbc
cast128-cbc
rijndael-cbc@lysator.liu.se

Solution
Solution type: Mitigation
Disable the weak encryption algorithms.

Vulnerability Insight
The `arcfour` cipher is the Arcfour stream cipher with 128-bit keys. The Arcfour cipher is believed
to be compatible with the RC4 cipher [SCHNEIER]. Arcfour (and RC4) has problems with weak
keys, and should not be used anymore.
The `none` algorithm species that no encryption is to be done. Note that this method provides
no condentiality protection, and it is NOT RECOMMENDED to use it.
A vulnerability exists in SSH messages that employ CBC mode that may allow an attacker to
recover plaintext from a block of ciphertext.

Vulnerability Detection Method


. . . continues on next page . . .
2 RESULTS PER HOST 35

. . . continued from previous page . . .


Check if remote ssh service supports Arcfour, none or CBC ciphers.
Details: SSH Weak Encryption Algorithms Supported
OID:1.3.6.1.4.1.25623.1.0.105611
Version used: $Revision: 13581 $

References
Other:
URL:https://tools.ietf.org/html/rfc4253#section-6.3
URL:https://www.kb.cert.org/vuls/id/958563

[ return to 192.168.87.129 ]

2.1.21 Medium 21/tcp

Medium (CVSS: 6.4)


NVT: Anonymous FTP Login Reporting

Summary
Reports if the remote FTP Server allows anonymous logins.

Vulnerability Detection Result


It was possible to login to the remote FTP service with the following anonymous
,→account(s):
anonymous:anonymous@example.com
ftp:anonymous@example.com

Impact
Based on the les accessible via this anonymous FTP login and the permissions of this account
an attacker might be able to:
- gain access to sensitive les
- upload or delete les.

Solution
Solution type: Mitigation
If you do not want to share les, you should disable anonymous logins.

Vulnerability Insight
A host that provides an FTP service may additionally provide Anonymous FTP access as well.
Under this arrangement, users do not strictly need an account on the host. Instead the user
typically enters 'anonymous' or 'ftp' when prompted for username. Although users are commonly
asked to send their email address as their password, little to no verication is actually performed
on the supplied data.

Vulnerability Detection Method


Details: Anonymous FTP Login Reporting
OID:1.3.6.1.4.1.25623.1.0.900600
. . . continues on next page . . .
2 RESULTS PER HOST 36

. . . continued from previous page . . .


Version used: $Revision: 12030 $

References
Other:
URL:https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0497

Medium (CVSS: 4.8)


NVT: FTP Unencrypted Cleartext Login

Summary
The remote host is running a FTP service that allows cleartext logins over unencrypted connec-
tions.

Vulnerability Detection Result


The remote FTP service accepts logins without a previous sent 'AUTH TLS' command
,→. Response(s):
Anonymous sessions: 331 Please specify the password.
Non-anonymous sessions: 331 Please specify the password.

Impact
An attacker can uncover login names and passwords by sning trac to the FTP service.

Solution
Solution type: Mitigation
Enable FTPS or enforce the connection via the 'AUTH TLS' command. Please see the manual
of the FTP service for more information.

Vulnerability Detection Method


Tries to login to a non FTPS enabled FTP service without sending a 'AUTH TLS' command
rst and checks if the service is accepting the login without enforcing the use of the 'AUTH TLS'
command.
Details: FTP Unencrypted Cleartext Login
OID:1.3.6.1.4.1.25623.1.0.108528
Version used: $Revision: 13611 $

[ return to 192.168.87.129 ]

2.1.22 Medium 5900/tcp

Medium (CVSS: 4.8)


NVT: VNC Server Unencrypted Data Transmission

Summary
The remote host is running a VNC server providing one or more insecure or cryptographically
weak Security Type(s) not intended for use on untrusted networks.
. . . continues on next page . . .
2 RESULTS PER HOST 37

. . . continued from previous page . . .

Vulnerability Detection Result


The VNC server provides the following insecure or cryptographically weak Securit
,→y Type(s):
2 (VNC authentication)

Impact
An attacker can uncover sensitive data by sning trac to the VNC server.

Solution
Solution type: Mitigation
Run the session over an encrypted channel provided by IPsec [RFC4301] or SSH [RFC4254].
Some VNC server vendors are also providing more secure Security Types within their products.

Vulnerability Detection Method


Details: VNC Server Unencrypted Data Transmission
OID:1.3.6.1.4.1.25623.1.0.108529
Version used: $Revision: 13014 $

References
Other:
URL:https://tools.ietf.org/html/rfc6143#page-10

[ return to 192.168.87.129 ]

2.1.23 Medium 5432/tcp

Medium (CVSS: 6.8)


NVT: SSL/TLS: OpenSSL CCS Man in the Middle Security Bypass Vulnerability

Summary
OpenSSL is prone to security-bypass vulnerability.

Vulnerability Detection Result


Vulnerability was detected according to the Vulnerability Detection Method.

Impact
Successfully exploiting this issue may allow attackers to obtain sensitive information by conduct-
ing a man-in-the-middle attack. This may lead to other attacks.

Solution
Solution type: VendorFix
Updates are available. Please see the references for more information.

Aected Software/OS
OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m and 1.0.1 before 1.0.1h.
. . . continues on next page . . .
2 RESULTS PER HOST 38

. . . continued from previous page . . .

Vulnerability Insight
OpenSSL does not properly restrict processing of ChangeCipherSpec messages, which allows
man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-
OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via
a crafted TLS handshake, aka the 'CCS Injection' vulnerability.

Vulnerability Detection Method


Send two SSL ChangeCipherSpec request and check the response.
Details: SSL/TLS: OpenSSL CCS Man in the Middle Security Bypass Vulnerability
OID:1.3.6.1.4.1.25623.1.0.105042
Version used: $Revision: 12865 $

References
CVE: CVE-2014-0224
BID:67899
Other:
URL:https://www.openssl.org/news/secadv/20140605.txt
URL:http://www.securityfocus.com/bid/67899
URL:http://openssl.org/

Medium (CVSS: 5.0)


NVT: SSL/TLS: Certicate Expired

Summary
The remote server's SSL/TLS certicate has already expired.

Vulnerability Detection Result


The certificate of the remote service expired on 2010-04-16 14:07:45.
Certificate details:
subject ...: 1.2.840.113549.1.9.1=#726F6F74407562756E74753830342D626173652E6C6F6
,→3616C646F6D61696E,CN=ubuntu804-base.localdomain,OU=Office for Complication of
,→Otherwise Simple Affairs,O=OCOSA,L=Everywhere,ST=There is no such thing outsid
,→e US,C=XX
subject alternative names (SAN):
None
issued by .: 1.2.840.113549.1.9.1=#726F6F74407562756E74753830342D626173652E6C6F6
,→3616C646F6D61696E,CN=ubuntu804-base.localdomain,OU=Office for Complication of
,→Otherwise Simple Affairs,O=OCOSA,L=Everywhere,ST=There is no such thing outsid
,→e US,C=XX
serial ....: 00FAF93A4C7FB6B9CC
valid from : 2010-03-17 14:07:45 UTC
valid until: 2010-04-16 14:07:45 UTC
fingerprint (SHA-1): ED093088706603BFD5DC237399B498DA2D4D31C6
fingerprint (SHA-256): E7A7FA0D63E457C7C4A59B38B70849C6A70BDA6F830C7AF1E32DEE436
,→DE813CC
. . . continues on next page . . .
2 RESULTS PER HOST 39

. . . continued from previous page . . .

Solution
Solution type: Mitigation
Replace the SSL/TLS certicate by a new one.

Vulnerability Insight
This script checks expiry dates of certicates associated with SSL/TLS-enabled services on the
target and reports whether any have already expired.

Vulnerability Detection Method


Details: SSL/TLS: Certificate Expired
OID:1.3.6.1.4.1.25623.1.0.103955
Version used: $Revision: 11103 $

Medium (CVSS: 4.3)


NVT: SSL/TLS: SSLv3 Protocol CBC Cipher Suites Information Disclosure Vulnerability (POO-
DLE)

Summary
This host is prone to an information disclosure vulnerability.

Vulnerability Detection Result


Vulnerability was detected according to the Vulnerability Detection Method.

Impact
Successful exploitation will allow a man-in-the-middle attackers gain access to the plain text data
stream.

Solution
Solution type: Mitigation
Possible Mitigations are:
- Disable SSLv3
- Disable cipher suites supporting CBC cipher modes
- Enable TLS_FALLBACK_SCSV if the service is providing TLSv1.0+

Vulnerability Insight
The aw is due to the block cipher padding not being deterministic and not covered by the
Message Authentication Code

Vulnerability Detection Method


Evaluate previous collected information about this service.
Details: SSL/TLS: SSLv3 Protocol CBC Cipher Suites Information Disclosure Vulnerability .
,→..
OID:1.3.6.1.4.1.25623.1.0.802087
Version used: $Revision: 11402 $

. . . continues on next page . . .


2 RESULTS PER HOST 40

. . . continued from previous page . . .


References
CVE: CVE-2014-3566
BID:70574
Other:
URL:https://www.openssl.org/~bodo/ssl-poodle.pdf
URL:https://www.imperialviolet.org/2014/10/14/poodle.html
URL:https://www.dfranke.us/posts/2014-10-14-how-poodle-happened.html
URL:http://googleonlinesecurity.blogspot.in/2014/10/this-poodle-bites-exploit
,→ing-ssl-30.html

Medium (CVSS: 4.3)


NVT: SSL/TLS: Deprecated SSLv2 and SSLv3 Protocol Detection

Summary
It was possible to detect the usage of the deprecated SSLv2 and/or SSLv3 protocol on this
system.

Vulnerability Detection Result


In addition to TLSv1.0+ the service is also providing the deprecated SSLv3 proto
,→col and supports one or more ciphers. Those supported ciphers can be found in
,→the 'SSL/TLS: Report Weak and Supported Ciphers' (OID: 1.3.6.1.4.1.25623.1.0.8
,→02067) NVT.

Impact
An attacker might be able to use the known cryptographic aws to eavesdrop the connection
between clients and the service to get access to sensitive data transferred within the secured
connection.

Solution
Solution type: Mitigation
It is recommended to disable the deprecated SSLv2 and/or SSLv3 protocols in favor of the
TLSv1+ protocols. Please see the references for more information.

Aected Software/OS
All services providing an encrypted communication using the SSLv2 and/or SSLv3 protocols.

Vulnerability Insight
The SSLv2 and SSLv3 protocols containing known cryptographic aws like:
- Padding Oracle On Downgraded Legacy Encryption (POODLE, CVE-2014-3566)
- Decrypting RSA with Obsolete and Weakened eNcryption (DROWN, CVE-2016-0800)

Vulnerability Detection Method


Check the used protocols of the services provided by this system.
Details: SSL/TLS: Deprecated SSLv2 and SSLv3 Protocol Detection
OID:1.3.6.1.4.1.25623.1.0.111012
Version used: $Revision: 5547 $
. . . continues on next page . . .
2 RESULTS PER HOST 41

. . . continued from previous page . . .

References
CVE: CVE-2016-0800, CVE-2014-3566
Other:
URL:https://www.enisa.europa.eu/activities/identity-and-trust/library/delivera
,→bles/algorithms-key-sizes-and-parameters-report
URL:https://bettercrypto.org/
URL:https://mozilla.github.io/server-side-tls/ssl-config-generator/
URL:https://drownattack.com/
URL:https://www.imperialviolet.org/2014/10/14/poodle.html

Medium (CVSS: 4.3)


NVT: SSL/TLS: Report Weak Cipher Suites

Summary
This routine reports all Weak SSL/TLS cipher suites accepted by a service.
NOTE: No severity for SMTP services with 'Opportunistic TLS' and weak cipher suites on port
25/tcp is reported. If too strong cipher suites are congured for this service the alternative would
be to fall back to an even more insecure cleartext communication.

Vulnerability Detection Result


'Weak' cipher suites accepted by this service via the SSLv3 protocol:
TLS_RSA_WITH_RC4_128_SHA
'Weak' cipher suites accepted by this service via the TLSv1.0 protocol:
TLS_RSA_WITH_RC4_128_SHA

Solution
Solution type: Mitigation
The conguration of this services should be changed so that it does not accept the listed weak
cipher suites anymore.
Please see the references for more resources supporting you with this task.

Vulnerability Insight
These rules are applied for the evaluation of the cryptographic strength:
- RC4 is considered to be weak (CVE-2013-2566, CVE-2015-2808).
- Ciphers using 64 bit or less are considered to be vulnerable to brute force methods and therefore
considered as weak (CVE-2015-4000).
- 1024 bit RSA authentication is considered to be insecure and therefore as weak.
- Any cipher considered to be secure for only the next 10 years is considered as medium
- Any other cipher is considered as strong

Vulnerability Detection Method


Details: SSL/TLS: Report Weak Cipher Suites
OID:1.3.6.1.4.1.25623.1.0.103440
Version used: $Revision: 11135 $

References
. . . continues on next page . . .
2 RESULTS PER HOST 42

. . . continued from previous page . . .


CVE: CVE-2013-2566, CVE-2015-2808, CVE-2015-4000
Other:
URL:https://www.bsi.bund.de/SharedDocs/Warnmeldungen/DE/CB/warnmeldung_cb-k16-
,→1465_update_6.html
URL:https://bettercrypto.org/
URL:https://mozilla.github.io/server-side-tls/ssl-config-generator/

Medium (CVSS: 4.0)


NVT: SSL/TLS: Die-Hellman Key Exchange Insucient DH Group Strength Vulnerability

Summary
The SSL/TLS service uses Die-Hellman groups with insucient strength (key size < 2048).

Vulnerability Detection Result


Server Temporary Key Size: 1024 bits

Impact
An attacker might be able to decrypt the SSL/TLS communication oine.

Solution
Solution type: Workaround
Deploy (Ephemeral) Elliptic-Curve Die-Hellman (ECDHE) or use a 2048-bit or stronger Die-
Hellman group (see the references).
For Apache Web Servers: Beginning with version 2.4.7, mod_ssl will use DH parameters which
include primes with lengths of more than 1024 bits.

Vulnerability Insight
The Die-Hellman group are some big numbers that are used as base for the DH computations.
They can be, and often are, xed. The security of the nal secret depends on the size of these
parameters. It was found that 512 and 768 bits to be weak, 1024 bits to be breakable by really
powerful attackers like governments.

Vulnerability Detection Method


Checks the DHE temporary public key size.
Details: SSL/TLS: Diffie-Hellman Key Exchange Insufficient DH Group Strength Vulnerabili.
,→..
OID:1.3.6.1.4.1.25623.1.0.106223
Version used: $Revision: 12865 $

References
Other:
URL:https://weakdh.org/
URL:https://weakdh.org/sysadmin.html
2 RESULTS PER HOST 43

Medium (CVSS: 4.0)


NVT: SSL/TLS: Certicate Signed Using A Weak Signature Algorithm

Summary
The remote service is using a SSL/TLS certicate in the certicate chain that has been signed
using a cryptographically weak hashing algorithm.

Vulnerability Detection Result


The following certificates are part of the certificate chain but using insecure
,→signature algorithms:
Subject: 1.2.840.113549.1.9.1=#726F6F74407562756E74753830342D626173
,→652E6C6F63616C646F6D61696E,CN=ubuntu804-base.localdomain,OU=Office for Complic
,→ation of Otherwise Simple Affairs,O=OCOSA,L=Everywhere,ST=There is no such thi
,→ng outside US,C=XX
Signature Algorithm: sha1WithRSAEncryption

Solution
Solution type: Mitigation
Servers that use SSL/TLS certicates signed with a weak SHA-1, MD5, MD4 or MD2 hashing
algorithm will need to obtain new SHA-2 signed SSL/TLS certicates to avoid web browser
SSL/TLS certicate warnings.

Vulnerability Insight
The following hashing algorithms used for signing SSL/TLS certicates are considered crypto-
graphically weak and not secure enough for ongoing use:
- Secure Hash Algorithm 1 (SHA-1)
- Message Digest 5 (MD5)
- Message Digest 4 (MD4)
- Message Digest 2 (MD2)
Beginning as late as January 2017 and as early as June 2016, browser developers such as Microsoft
and Google will begin warning users when visiting web sites that use SHA-1 signed Secure Socket
Layer (SSL) certicates.
NOTE: The script preference allows to set one or more custom SHA-1 ngerprints of CA certi-
cates which are trusted by this routine. The ngerprints needs to be passed comma-separated
and case-insensitive:
Fingerprint1
or
ngerprint1,Fingerprint2

Vulnerability Detection Method


Check which hashing algorithm was used to sign the remote SSL/TLS certicate.
Details: SSL/TLS: Certificate Signed Using A Weak Signature Algorithm
OID:1.3.6.1.4.1.25623.1.0.105880
Version used: $Revision: 8810 $

References
Other:
URL:https://blog.mozilla.org/security/2014/09/23/phasing-out-certificates-with
. . . continues on next page . . .
2 RESULTS PER HOST 44

. . . continued from previous page . . .


,→-sha-1-based-signature-algorithms/

[ return to 192.168.87.129 ]

2.1.24 Medium 25/tcp

Medium (CVSS: 6.8)


NVT: Multiple Vendors STARTTLS Implementation Plaintext Arbitrary Command Injection
Vulnerability

Summary
Multiple vendors' implementations of 'STARTTLS' are prone to a vulnerability that lets attackers
inject arbitrary commands.

Vulnerability Detection Result


Vulnerability was detected according to the Vulnerability Detection Method.

Impact
An attacker can exploit this issue to execute arbitrary commands in the context of the user
running the application. Successful exploits can allow attackers to obtain email usernames and
passwords.

Solution
Solution type: VendorFix
Updates are available. Please see the references for more information.

Aected Software/OS
The following vendors are aected:
Ipswitch
Kerio
Postx
Qmail-TLS
Oracle
SCO Group
spamdyke
ISC

Vulnerability Detection Method


Send a special crafted 'STARTTLS' request and check the response.
Details: Multiple Vendors STARTTLS Implementation Plaintext Arbitrary Command Injection .
,→..
OID:1.3.6.1.4.1.25623.1.0.103935
Version used: $Revision: 13204 $

References
CVE: CVE-2011-0411, CVE-2011-1430, CVE-2011-1431, CVE-2011-1432, CVE-2011-1506,
. . . continues on next page . . .
2 RESULTS PER HOST 45

. . . continued from previous page . . .


,→CVE-2011-1575, CVE-2011-1926, CVE-2011-2165
BID:46767
Other:
URL:http://www.securityfocus.com/bid/46767
URL:http://kolab.org/pipermail/kolab-announce/2011/000101.html
URL:http://bugzilla.cyrusimap.org/show_bug.cgi?id=3424
URL:http://cyrusimap.org/mediawiki/index.php/Bugs_Resolved_in_2.4.7
URL:http://www.kb.cert.org/vuls/id/MAPG-8D9M4P
URL:http://files.kolab.org/server/release/kolab-server-2.3.2/sources/release-
,→notes.txt
URL:http://www.postfix.org/CVE-2011-0411.html
URL:http://www.pureftpd.org/project/pure-ftpd/news
URL:http://www.watchguard.com/support/release-notes/xcs/9/en-US/EN_ReleaseNot
,→es_XCS_9_1_1/EN_ReleaseNotes_WG_XCS_9_1_TLS_Hotfix.pdf
URL:http://www.spamdyke.org/documentation/Changelog.txt
URL:http://datatracker.ietf.org/doc/draft-josefsson-kerberos5-starttls/?inclu
,→de_text=1
URL:http://www.securityfocus.com/archive/1/516901
URL:http://support.avaya.com/css/P8/documents/100134676
URL:http://support.avaya.com/css/P8/documents/100141041
URL:http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html
URL:http://inoa.net/qmail-tls/vu555316.patch
URL:http://www.kb.cert.org/vuls/id/555316

Medium (CVSS: 5.0)


NVT: SSL/TLS: Certicate Expired

Summary
The remote server's SSL/TLS certicate has already expired.

Vulnerability Detection Result


The certificate of the remote service expired on 2010-04-16 14:07:45.
Certificate details:
subject ...: 1.2.840.113549.1.9.1=#726F6F74407562756E74753830342D626173652E6C6F6
,→3616C646F6D61696E,CN=ubuntu804-base.localdomain,OU=Office for Complication of
,→Otherwise Simple Affairs,O=OCOSA,L=Everywhere,ST=There is no such thing outsid
,→e US,C=XX
subject alternative names (SAN):
None
issued by .: 1.2.840.113549.1.9.1=#726F6F74407562756E74753830342D626173652E6C6F6
,→3616C646F6D61696E,CN=ubuntu804-base.localdomain,OU=Office for Complication of
,→Otherwise Simple Affairs,O=OCOSA,L=Everywhere,ST=There is no such thing outsid
,→e US,C=XX
serial ....: 00FAF93A4C7FB6B9CC
valid from : 2010-03-17 14:07:45 UTC
valid until: 2010-04-16 14:07:45 UTC
fingerprint (SHA-1): ED093088706603BFD5DC237399B498DA2D4D31C6
. . . continues on next page . . .
2 RESULTS PER HOST 46

. . . continued from previous page . . .


fingerprint (SHA-256): E7A7FA0D63E457C7C4A59B38B70849C6A70BDA6F830C7AF1E32DEE436
,→DE813CC

Solution
Solution type: Mitigation
Replace the SSL/TLS certicate by a new one.

Vulnerability Insight
This script checks expiry dates of certicates associated with SSL/TLS-enabled services on the
target and reports whether any have already expired.

Vulnerability Detection Method


Details: SSL/TLS: Certificate Expired
OID:1.3.6.1.4.1.25623.1.0.103955
Version used: $Revision: 11103 $

Medium (CVSS: 5.0)


NVT: Check if Mailserver answer to VRFY and EXPN requests

Summary
The Mailserver on this host answers to VRFY and/or EXPN requests.

Vulnerability Detection Result


'VRFY root' produces the following answer: 252 2.0.0 root

Solution
Solution type: Workaround
Disable VRFY and/or EXPN on your Mailserver.
For postx add 'disable_vrfy_command=yes' in 'main.cf '.
For Sendmail add the option 'O PrivacyOptions=goaway'.
It is suggested that, if you really want to publish this type of information, you use a mechanism
that legitimate users actually know about, such as Finger or HTTP.

Vulnerability Insight
VRFY and EXPN ask the server for information about an address. They are inherently unusable
through rewalls, gateways, mail exchangers for part-time hosts, etc.

Vulnerability Detection Method


Details: Check if Mailserver answer to VRFY and EXPN requests
OID:1.3.6.1.4.1.25623.1.0.100072
Version used: $Revision: 13470 $

References
Other:
URL:http://cr.yp.to/smtp/vrfy.html
2 RESULTS PER HOST 47

Medium (CVSS: 4.3)


NVT: SSL/TLS: SSLv3 Protocol CBC Cipher Suites Information Disclosure Vulnerability (POO-
DLE)

Summary
This host is prone to an information disclosure vulnerability.

Vulnerability Detection Result


Vulnerability was detected according to the Vulnerability Detection Method.

Impact
Successful exploitation will allow a man-in-the-middle attackers gain access to the plain text data
stream.

Solution
Solution type: Mitigation
Possible Mitigations are:
- Disable SSLv3
- Disable cipher suites supporting CBC cipher modes
- Enable TLS_FALLBACK_SCSV if the service is providing TLSv1.0+

Vulnerability Insight
The aw is due to the block cipher padding not being deterministic and not covered by the
Message Authentication Code

Vulnerability Detection Method


Evaluate previous collected information about this service.
Details: SSL/TLS: SSLv3 Protocol CBC Cipher Suites Information Disclosure Vulnerability .
,→..
OID:1.3.6.1.4.1.25623.1.0.802087
Version used: $Revision: 11402 $

References
CVE: CVE-2014-3566
BID:70574
Other:
URL:https://www.openssl.org/~bodo/ssl-poodle.pdf
URL:https://www.imperialviolet.org/2014/10/14/poodle.html
URL:https://www.dfranke.us/posts/2014-10-14-how-poodle-happened.html
URL:http://googleonlinesecurity.blogspot.in/2014/10/this-poodle-bites-exploit
,→ing-ssl-30.html

Medium (CVSS: 4.3)


NVT: SSL/TLS: RSA Temporary Key Handling 'RSA_EXPORT' Downgrade Issue (FREAK)

Summary
This host is accepting 'RSA_EXPORT' cipher suites and is prone to man in the middle attack.
. . . continues on next page . . .
2 RESULTS PER HOST 48

. . . continued from previous page . . .

Vulnerability Detection Result


'RSA_EXPORT' cipher suites accepted by this service via the SSLv3 protocol:
TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
TLS_RSA_EXPORT_WITH_DES40_CBC_SHA
TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5
TLS_RSA_EXPORT_WITH_RC4_40_MD5
'RSA_EXPORT' cipher suites accepted by this service via the TLSv1.0 protocol:
TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
TLS_RSA_EXPORT_WITH_DES40_CBC_SHA
TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5
TLS_RSA_EXPORT_WITH_RC4_40_MD5

Impact
Successful exploitation will allow remote attacker to downgrade the security of a session to use
'RSA_EXPORT' cipher suites, which are signicantly weaker than non-export cipher suites.
This may allow a man-in-the-middle attacker to more easily break the encryption and monitor
or tamper with the encrypted stream.

Solution
Solution type: VendorFix
- Remove support for 'RSA_EXPORT' cipher suites from the service.
- If running OpenSSL update to version 0.9.8zd or 1.0.0p or 1.0.1k or later.

Aected Software/OS
- Hosts accepting 'RSA_EXPORT' cipher suites
- OpenSSL version before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k.

Vulnerability Insight
Flaw is due to improper handling RSA temporary keys in a non-export RSA key exchange cipher
suite.

Vulnerability Detection Method


Check previous collected cipher suites saved in the KB.
Details: SSL/TLS: RSA Temporary Key Handling 'RSA_EXPORT' Downgrade Issue (FREAK)
OID:1.3.6.1.4.1.25623.1.0.805142
Version used: $Revision: 11872 $

References
CVE: CVE-2015-0204
BID:71936
Other:
URL:https://freakattack.com
URL:http://secpod.org/blog/?p=3818
URL:http://blog.cryptographyengineering.com/2015/03/attack-of-week-freak-or-f
,→actoring-nsa.html
URL:https://www.openssl.org
2 RESULTS PER HOST 49

Medium (CVSS: 4.3)


NVT: SSL/TLS: 'DHE_EXPORT' Man in the Middle Security Bypass Vulnerability (LogJam)

Summary
This host is accepting 'DHE_EXPORT' cipher suites and is prone to man in the middle attack.

Vulnerability Detection Result


'DHE_EXPORT' cipher suites accepted by this service via the SSLv3 protocol:
TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA
TLS_DH_anon_EXPORT_WITH_RC4_40_MD5
'DHE_EXPORT' cipher suites accepted by this service via the TLSv1.0 protocol:
TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA
TLS_DH_anon_EXPORT_WITH_RC4_40_MD5

Impact
Successful exploitation will allow a man-in-the-middle attacker to downgrade the security of a
TLS session to 512-bit export-grade cryptography, which is signicantly weaker, allowing the
attacker to more easily break the encryption and monitor or tamper with the encrypted stream.

Solution
Solution type: VendorFix
- Remove support for 'DHE_EXPORT' cipher suites from the service
- If running OpenSSL updateto version 1.0.2b or 1.0.1n or later.

Aected Software/OS
- Hosts accepting 'DHE_EXPORT' cipher suites
- OpenSSL version before 1.0.2b and 1.0.1n

Vulnerability Insight
Flaw is triggered when handling Die-Hellman key exchanges dened in the 'DHE_EXPORT'
cipher suites.

Vulnerability Detection Method


Check previous collected cipher suites saved in the KB.
Details: SSL/TLS: 'DHE_EXPORT' Man in the Middle Security Bypass Vulnerability (LogJam)
OID:1.3.6.1.4.1.25623.1.0.805188
Version used: $Revision: 11872 $

References
CVE: CVE-2015-4000
BID:74733
Other:
URL:https://weakdh.org
URL:https://weakdh.org/imperfect-forward-secrecy.pdf
URL:http://openwall.com/lists/oss-security/2015/05/20/8
URL:https://blog.cloudflare.com/logjam-the-latest-tls-vulnerability-explained
. . . continues on next page . . .
2 RESULTS PER HOST 50

. . . continued from previous page . . .


URL:https://www.openssl.org/blog/blog/2015/05/20/logjam-freak-upcoming-change
,→s

Medium (CVSS: 4.3)


NVT: SSL/TLS: Deprecated SSLv2 and SSLv3 Protocol Detection

Summary
It was possible to detect the usage of the deprecated SSLv2 and/or SSLv3 protocol on this
system.

Vulnerability Detection Result


In addition to TLSv1.0+ the service is also providing the deprecated SSLv2 and S
,→SLv3 protocols and supports one or more ciphers. Those supported ciphers can b
,→e found in the 'SSL/TLS: Report Weak and Supported Ciphers' (OID: 1.3.6.1.4.1.
,→25623.1.0.802067) NVT.

Impact
An attacker might be able to use the known cryptographic aws to eavesdrop the connection
between clients and the service to get access to sensitive data transferred within the secured
connection.

Solution
Solution type: Mitigation
It is recommended to disable the deprecated SSLv2 and/or SSLv3 protocols in favor of the
TLSv1+ protocols. Please see the references for more information.

Aected Software/OS
All services providing an encrypted communication using the SSLv2 and/or SSLv3 protocols.

Vulnerability Insight
The SSLv2 and SSLv3 protocols containing known cryptographic aws like:
- Padding Oracle On Downgraded Legacy Encryption (POODLE, CVE-2014-3566)
- Decrypting RSA with Obsolete and Weakened eNcryption (DROWN, CVE-2016-0800)

Vulnerability Detection Method


Check the used protocols of the services provided by this system.
Details: SSL/TLS: Deprecated SSLv2 and SSLv3 Protocol Detection
OID:1.3.6.1.4.1.25623.1.0.111012
Version used: $Revision: 5547 $

References
CVE: CVE-2016-0800, CVE-2014-3566
Other:
URL:https://www.enisa.europa.eu/activities/identity-and-trust/library/delivera
,→bles/algorithms-key-sizes-and-parameters-report
URL:https://bettercrypto.org/
. . . continues on next page . . .
2 RESULTS PER HOST 51

. . . continued from previous page . . .


URL:https://mozilla.github.io/server-side-tls/ssl-config-generator/
URL:https://drownattack.com/
URL:https://www.imperialviolet.org/2014/10/14/poodle.html

Medium (CVSS: 4.0)


NVT: SSL/TLS: Die-Hellman Key Exchange Insucient DH Group Strength Vulnerability

Summary
The SSL/TLS service uses Die-Hellman groups with insucient strength (key size < 2048).

Vulnerability Detection Result


Server Temporary Key Size: 1024 bits

Impact
An attacker might be able to decrypt the SSL/TLS communication oine.

Solution
Solution type: Workaround
Deploy (Ephemeral) Elliptic-Curve Die-Hellman (ECDHE) or use a 2048-bit or stronger Die-
Hellman group (see the references).
For Apache Web Servers: Beginning with version 2.4.7, mod_ssl will use DH parameters which
include primes with lengths of more than 1024 bits.

Vulnerability Insight
The Die-Hellman group are some big numbers that are used as base for the DH computations.
They can be, and often are, xed. The security of the nal secret depends on the size of these
parameters. It was found that 512 and 768 bits to be weak, 1024 bits to be breakable by really
powerful attackers like governments.

Vulnerability Detection Method


Checks the DHE temporary public key size.
Details: SSL/TLS: Diffie-Hellman Key Exchange Insufficient DH Group Strength Vulnerabili.
,→..
OID:1.3.6.1.4.1.25623.1.0.106223
Version used: $Revision: 12865 $

References
Other:
URL:https://weakdh.org/
URL:https://weakdh.org/sysadmin.html

Medium (CVSS: 4.0)


NVT: SSL/TLS: Certicate Signed Using A Weak Signature Algorithm

Summary
. . . continues on next page . . .
2 RESULTS PER HOST 52

. . . continued from previous page . . .


The remote service is using a SSL/TLS certicate in the certicate chain that has been signed
using a cryptographically weak hashing algorithm.

Vulnerability Detection Result


The following certificates are part of the certificate chain but using insecure
,→signature algorithms:
Subject: 1.2.840.113549.1.9.1=#726F6F74407562756E74753830342D626173
,→652E6C6F63616C646F6D61696E,CN=ubuntu804-base.localdomain,OU=Office for Complic
,→ation of Otherwise Simple Affairs,O=OCOSA,L=Everywhere,ST=There is no such thi
,→ng outside US,C=XX
Signature Algorithm: sha1WithRSAEncryption

Solution
Solution type: Mitigation
Servers that use SSL/TLS certicates signed with a weak SHA-1, MD5, MD4 or MD2 hashing
algorithm will need to obtain new SHA-2 signed SSL/TLS certicates to avoid web browser
SSL/TLS certicate warnings.

Vulnerability Insight
The following hashing algorithms used for signing SSL/TLS certicates are considered crypto-
graphically weak and not secure enough for ongoing use:
- Secure Hash Algorithm 1 (SHA-1)
- Message Digest 5 (MD5)
- Message Digest 4 (MD4)
- Message Digest 2 (MD2)
Beginning as late as January 2017 and as early as June 2016, browser developers such as Microsoft
and Google will begin warning users when visiting web sites that use SHA-1 signed Secure Socket
Layer (SSL) certicates.
NOTE: The script preference allows to set one or more custom SHA-1 ngerprints of CA certi-
cates which are trusted by this routine. The ngerprints needs to be passed comma-separated
and case-insensitive:
Fingerprint1
or
ngerprint1,Fingerprint2

Vulnerability Detection Method


Check which hashing algorithm was used to sign the remote SSL/TLS certicate.
Details: SSL/TLS: Certificate Signed Using A Weak Signature Algorithm
OID:1.3.6.1.4.1.25623.1.0.105880
Version used: $Revision: 8810 $

References
Other:
URL:https://blog.mozilla.org/security/2014/09/23/phasing-out-certificates-with
,→-sha-1-based-signature-algorithms/

[ return to 192.168.87.129 ]
2 RESULTS PER HOST 53

2.1.25 Medium 445/tcp

Medium (CVSS: 6.0)


NVT: Samba MS-RPC Remote Shell Command Execution Vulnerability (Active Check)

Product detection result


cpe:/a:samba:samba:3.0.20
Detected by SMB NativeLanMan (OID: 1.3.6.1.4.1.25623.1.0.102011)

Summary
Samba is prone to a vulnerability that allows attackers to execute arbitrary shell commands
because the software fails to sanitize user-supplied input.

Vulnerability Detection Result


Vulnerability was detected according to the Vulnerability Detection Method.

Impact
An attacker may leverage this issue to execute arbitrary shell commands on an aected system
with the privileges of the application.

Solution
Solution type: VendorFix
Updates are available. Please see the referenced vendor advisory.

Aected Software/OS
This issue aects Samba 3.0.0 to 3.0.25rc3.

Vulnerability Detection Method


Send a crafted command to the samba server and check for a remote command execution.
Details: Samba MS-RPC Remote Shell Command Execution Vulnerability (Active Check)
OID:1.3.6.1.4.1.25623.1.0.108011
Version used: $Revision: 10398 $

Product Detection Result


Product: cpe:/a:samba:samba:3.0.20
Method: SMB NativeLanMan
OID: 1.3.6.1.4.1.25623.1.0.102011)

References
CVE: CVE-2007-2447
BID:23972
Other:
URL:http://www.securityfocus.com/bid/23972
URL:https://www.samba.org/samba/security/CVE-2007-2447.html

[ return to 192.168.87.129 ]
2 RESULTS PER HOST 54

2.1.26 Medium 2121/tcp

Medium (CVSS: 4.8)


NVT: FTP Unencrypted Cleartext Login

Summary
The remote host is running a FTP service that allows cleartext logins over unencrypted connec-
tions.

Vulnerability Detection Result


The remote FTP service accepts logins without a previous sent 'AUTH TLS' command
,→. Response(s):
Anonymous sessions: 331 Password required for anonymous
Non-anonymous sessions: 331 Password required for openvas-vt

Impact
An attacker can uncover login names and passwords by sning trac to the FTP service.

Solution
Solution type: Mitigation
Enable FTPS or enforce the connection via the 'AUTH TLS' command. Please see the manual
of the FTP service for more information.

Vulnerability Detection Method


Tries to login to a non FTPS enabled FTP service without sending a 'AUTH TLS' command
rst and checks if the service is accepting the login without enforcing the use of the 'AUTH TLS'
command.
Details: FTP Unencrypted Cleartext Login
OID:1.3.6.1.4.1.25623.1.0.108528
Version used: $Revision: 13611 $

[ return to 192.168.87.129 ]

2.1.27 Low 80/tcp

Low (CVSS: 3.5)


NVT: Tiki Wiki CMS Groupware XSS Vulnerability

Product detection result


cpe:/a:tiki:tikiwiki_cms/groupware:1.9.5
Detected by Tiki Wiki CMS Groupware Version Detection (OID: 1.3.6.1.4.1.25623.1.
,→0.901001)

Summary
. . . continues on next page . . .
2 RESULTS PER HOST 55

. . . continued from previous page . . .


An XSS vulnerability (via an SVG image) in Tiki allows an authenticated user to gain adminis-
trator privileges if an administrator opens a wiki page with a malicious SVG image, related to
lib/legals/legallib.php.

Vulnerability Detection Result


Installed version: 1.9.5
Fixed version: 18.0

Solution
Solution type: VendorFix
Upgrade to version 18.0 or later.

Aected Software/OS
Tiki Wiki CMS Groupware prior to version 18.0.

Vulnerability Detection Method


Checks if a vulnerable version is present on the target host.
Details: Tiki Wiki CMS Groupware XSS Vulnerability
OID:1.3.6.1.4.1.25623.1.0.140797
Version used: $Revision: 12116 $

Product Detection Result


Product: cpe:/a:tiki:tikiwiki_cms/groupware:1.9.5
Method: Tiki Wiki CMS Groupware Version Detection
OID: 1.3.6.1.4.1.25623.1.0.901001)

References
CVE: CVE-2018-7188
Other:
URL:http://openwall.com/lists/oss-security/2018/02/16/1

[ return to 192.168.87.129 ]

2.1.28 Low 22/tcp

Low (CVSS: 2.6)


NVT: SSH Weak MAC Algorithms Supported

Summary
The remote SSH server is congured to allow weak MD5 and/or 96-bit MAC algorithms.

Vulnerability Detection Result


The following weak client-to-server MAC algorithms are supported by the remote s
,→ervice:
hmac-md5
. . . continues on next page . . .
2 RESULTS PER HOST 56

. . . continued from previous page . . .


hmac-md5-96
hmac-sha1-96
The following weak server-to-client MAC algorithms are supported by the remote s
,→ervice:
hmac-md5
hmac-md5-96
hmac-sha1-96

Solution
Solution type: Mitigation
Disable the weak MAC algorithms.

Vulnerability Detection Method


Details: SSH Weak MAC Algorithms Supported
OID:1.3.6.1.4.1.25623.1.0.105610
Version used: $Revision: 13581 $

[ return to 192.168.87.129 ]

2.1.29 Low general/tcp

Low (CVSS: 2.6)


NVT: TCP timestamps

Summary
The remote host implements TCP timestamps and therefore allows to compute the uptime.

Vulnerability Detection Result


It was detected that the host implements RFC1323.
The following timestamps were retrieved with a delay of 1 seconds in-between:
Packet 1: 81348
Packet 2: 81455

Impact
A side eect of this feature is that the uptime of the remote host can sometimes be computed.

Solution
Solution type: Mitigation
To disable TCP timestamps on linux add the line 'net.ipv4.tcp_timestamps = 0' to
/etc/sysctl.conf. Execute 'sysctl -p' to apply the settings at runtime.
To disable TCP timestamps on Windows execute 'netsh int tcp set global timestamps=disabled'
Starting with Windows Server 2008 and Vista, the timestamp can not be completely disabled.
The default behavior of the TCP/IP stack on this Systems is to not use the Timestamp options
when initiating TCP connections, but use them if the TCP peer that is initiating communication
includes them in their synchronize (SYN) segment.
See also: http://www.microsoft.com/en-us/download/details.aspx?id=9152
. . . continues on next page . . .
2 RESULTS PER HOST 57

. . . continued from previous page . . .

Aected Software/OS
TCP/IPv4 implementations that implement RFC1323.

Vulnerability Insight
The remote host implements TCP timestamps, as dened by RFC1323.

Vulnerability Detection Method


Special IP packets are forged and sent with a little delay in between to the target IP. The
responses are searched for a timestamps. If found, the timestamps are reported.
Details: TCP timestamps
OID:1.3.6.1.4.1.25623.1.0.80091
Version used: $Revision: 10411 $

References
Other:
URL:http://www.ietf.org/rfc/rfc1323.txt

[ return to 192.168.87.129 ]

This le was automatically generated.

You might also like