• No results found

Apache Partial HTTP Request Denial of Service Vulnerability - Zero Day. SSL Certificate - Subject Common Name Does Not Match Server FQDN

N/A
N/A
Protected

Academic year: 2021

Share "Apache Partial HTTP Request Denial of Service Vulnerability - Zero Day. SSL Certificate - Subject Common Name Does Not Match Server FQDN"

Copied!
71
0
0

Loading.... (view fulltext now)

Full text

(1)

Cookie Does Not Contain The "HTTPOnly" Attribute

Cookie Does Not Contain The "secure" Attribute

Cookie Does Not Contain The "secure" Attribute

Cookie Does Not Contain The "HTTPOnly" Attribute

SSL Server Allows Anonymous Authentication Vulnerability

Web Server Stopped Responding

POP3 Server Allows Plain Text Authentication Vulnerability

Mail Server Accepts Plaintext Credentials

Discovery of Unix Account Names Vulnerability

Discovery of Unix Account Names Vulnerability

Mail Server Accepts Plaintext Credentials

Web Server Stopped Responding

SSLv3.0/TLSv1.0 Protocol Weak CBC Mode Vulnerability

Apache Partial HTTP Request Denial of Service Vulnerability - Zero Day

SSL Certificate - Subject Common Name Does Not Match Server FQDN

SSL Certificate - Signature Verification Failed Vulnerability

SSL Certificate - Subject Common Name Does Not Match Server FQDN

SSL Certificate - Improper Usage Vulnerability

SSL Certificate - Subject Common Name Does Not Match Server FQDN

06 October 2014 at 16:21

0 10 24 72

Vulnerability

Scan

URL

:

http://www.test.co.uk

(2)

SSLCertificate-SubjectCommonNameDoesNotMatchServerFQDN

SSL Certificate - Subject Common Name Does Not Match Server FQDN

SSL Certificate - Subject Common Name Does Not Match Server FQDN

SSL Certificate - Subject Common Name Does Not Match Server FQDN

Global User List

SSL Certificate - Self-Signed Certificate

SSL Certificate - Subject Common Name Does Not Match Server FQDN

SSL Certificate - Subject Common Name Does Not Match Server FQDN

Database Instance Detected

SSL/TLS use of weak RC4 cipher

SSL/TLS use of weak RC4 cipher

SSL/TLS use of weak RC4 cipher

SSL/TLS use of weak RC4 cipher

Apache Web Server ETag Header Information Disclosure Weakness

Apache Web Server ETag Header Information Disclosure Weakness

Remote Access or Management Service Detected

Remote Management Service Accepting Unencrypted Credentials Detected

POP3 Banner

FTP Server Banner

IMAP Banner

Operating System Detected

SMTP Banner

SMTP Banner

SMTP Banner

IMAP Banner

(3)

MySQL Banner

SMTP Service Detected

SMTP Service Detected

Host Uptime Based on TCP TimeStamp Option

SMTP Service Detected

Web Server Version

Open TCP Services List

SSL Web Server Version

Firewall Detected

SSL Server Information Retrieval

Degree of Randomness of TCP Initial Sequence Numbers

SSL Certificate will expire within next six months

SSL Session Caching Information

TLS Secure Renegotiation Extension Supported

TLS Secure Renegotiation Extension Supported

SSL Server Information Retrieval

ICMP Replies Received

SSL Server Information Retrieval

SSL Certificate - Information

SSL Certificate - Information

List of Web Directories

Traceroute

SSL Session Caching Information

SSL Certificate - Information

Host Scan Time

(4)

SSL/TLSinvalidprotocolversiontolerance

SSL/TLS invalid protocol version tolerance

SSL Session Caching Information

IP ID Values Randomness

SSL Server Information Retrieval

List of Web Directories

SSL/TLS invalid protocol version tolerance

DNS Host Name

SSL Certificate - Information

SSL Certificate - Information

SSL Session Caching Information

TLS Secure Renegotiation Extension Supported

TLS Secure Renegotiation Extension Supported

TLS Secure Renegotiation Extension Supported

Host Names Found

TLS Secure Renegotiation Extension Supported

SSL Session Caching Information

SSL Session Caching Information

SSL Session Caching Information

SSL Certificate - Information

SSL Server Information Retrieval

TLS Secure Renegotiation Extension Supported

SSL Certificate - Information

SSL Session Caching Information

Target Network Information

(5)

SSLServerInformationRetrieval

SSL Session Caching Information

SSL Certificate - Information

Internet Service Provider

TLS Secure Renegotiation Extension Supported

SSL Server Information Retrieval

SSL Server Information Retrieval

SSL/TLS invalid protocol version tolerance

SSL Server Information Retrieval

QID: 150123 CVSS Base:

Category: Web Application Port:

-QID: 150122 CVSS Base:

Category: Web Application Port:

-Type: Web Application

Cookie Does Not Contain The "HTTPOnly" Attribute

CVEID:

-Threat:

Thecookiedoesnotcontainthe"HTTPOnly"attribute.

Impact:

Cookieswithoutthe"HTTPOnly"attributearepermittedtobeaccessedviaJavaScript. Cross-sitescriptingattackscanstealcookieswhichcouldleadtouserimpersonationor compromiseoftheapplicationaccount.

Solution:

Iftheassociatedriskofacompromisedaccountishigh,applythe"HTTPOnly"attributeto cookies.

Results:

http://www.test.co.uk/blog-page/

--wordpress_sec_bf07d8ddea19c831a87b2fd81497f82e=+; expires=Sun Oct 6 05:45:03 2013; path=/; domain=www.test.co.uk

Cookie Does Not Contain The "secure" Attribute

CVEID:

-Threat:

The cookie does not contain the "secure" attribute.

(6)

QID: 150122 CVSS Base: Category: Web Application Port:

-QID: 150123 CVSS Base:

Category: Web Application Port:

-QID: 38142 CVSS Base: 5.1

Cookieswiththe"secure"attributeareonlypermittedtobesentviaHTTPS.Session cookiessentviaHTTPexposeanunsuspectingusertosniffingattacksthatcouldleadto userimpersonationorcompromiseoftheapplicationaccount.

Solution:

Iftheassociatedriskofacompromisedaccountishigh,applythe"secure"attributeto cookiesandforceallsensitiverequeststobesentviaHTTPS.

Results:

http://www.test.co.uk/ -- PHPSESSID=70fa5d181bc2138ff263f0e994e5ccb2; path=/; domain=www.test.co.uk

Cookie Does Not Contain The "secure" Attribute

CVEID:

-Threat:

Thecookiedoesnotcontainthe"secure"attribute.

Impact:

Cookieswiththe"secure"attributeareonlypermittedtobesentviaHTTPS.Session cookiessentviaHTTPexposeanunsuspectingusertosniffingattacksthatcouldleadto userimpersonationorcompromiseoftheapplicationaccount.

Solution:

Iftheassociatedriskofacompromisedaccountishigh,applythe"secure"attributeto cookiesandforceallsensitiverequeststobesentviaHTTPS.

Results:

http://www.test.co.uk/blog-page/

--wordpress_bf07d8ddea19c831a87b2fd81497f82e=+; expires=Sun Oct 6 05:45:03 2013; path=/wp-content/plugins; domain=www.test.co.uk

Cookie Does Not Contain The "HTTPOnly" Attribute

CVEID:

-Threat:

Thecookiedoesnotcontainthe"HTTPOnly"attribute.

Impact:

Cookieswithoutthe"HTTPOnly"attributearepermittedtobeaccessedviaJavaScript. Cross-sitescriptingattackscanstealcookieswhichcouldleadtouserimpersonationor compromiseoftheapplicationaccount.

Solution:

Iftheassociatedriskofacompromisedaccountishigh,applythe"HTTPOnly"attributeto cookies.

Results:

http://www.test.co.uk/ -- PHPSESSID=70fa5d181bc2138ff263f0e994e5ccb2; path=/; domain=www.test.co.uk

Type: Vulnerability

(7)

Category: General remote services Port: 21

QID: 86476 CVSS Base: 2.3

Category: Web server Port: 443 CVEID:

-Threat:

The Secure Socket Layer (SSL) protocol allows for secure communication between a client and a server. The client usually authenticates the server using an algorithm like RSA or DSS. Some SSL ciphers allow SSL communication without authentication. Most common Web browsers like Microsoft Internet Explorer, Netscape and Mozilla do not use anonymous authentication ciphers by default.

A vulnerability exists in SSL communications when clients are allowed to connect using no authentication algorithm. SSL client-server communication may use several different types of authentication: RSA, Diffie-Hellman, DSS or none. When 'none' is used, the

communications are vulnerable to a man-in-the-middle attack."

Impact:

An attacker can exploit this vulnerability to impersonate your server to clients.

Solution:

Disable support for anonymous authentication.

1) Apache:

Typically, for Apache/mod_ssl, httpd.conf or ssl.conf should have the following lines: SSLProtocol -ALL +SSLv3 +TLSv1

SSLCipherSuite ALL:!aNULL:!ADH:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM For Apache/apache_ssl include the following line in the configuration file (httpsd.conf): SSLRequireCipher ALL:!aNULL:!ADH:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM

2) IIS:

For IIS please see: How to disable PCT 1.0, SSL 2.0, SSL 3.0, or TLS 1.0 in Internet

Information Services, How to Restrict the Use of Certain Cryptographic Algorithms and

Protocols in Schannel.dll, How to Determine the Cipher Suite for the Server and Client, , and

How to restrict the use of certain ciphers in Internet Information Services 5.0

3) Wu-FTP: For Wu-FTP which supports TLS, the ciphers parameter in TLS configuration file should be set to -ALL +SSLv3 +TLSv1

For more details please consult the docs/HOWTO/ssl_and_tls_ftpd.HOWTO file provided by wu-ftpd distribution.

4) Lighttpd: For lighttpd: Locate the lighttpd config file and modify the following ssl.ciper-list line to include !aNULL. A restart of the lightttpd application is necessary.

Example: ssl.cipher-list = "TLSv1+HIGH !SSLv2 RC4+MEDIUM !aNULL !eNULL !3DES @STRENGTH" Additional reading: http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_1-1/ssl.html http://httpd.apache.org/docs/2.0/mod/mod_ssl.html#sslciphersuite http://www.megasecurity.org/Info/ssl_servers.html Results:

#table cols="6" CIPHER KEY-EXCHANGE AUTHENTICATION MAC ENCRYPTION(KEY-STRENGTH) GRADE SSLv3_SUPPORTS_CIPHERS_WITH_NO_AUTHENTICATION _ _ _ _ _ ADH-RC4-MD5 DH None MD5 RC4(128)_ MEDIUM_ ADH-DES-CBC3-SHA DH None SHA1 3DES(168)_ HIGH_ ADH-AES128-SHA DH None SHA1 AES(128)_ MEDIUM_ ADH-AES256-SHA DH None ADH-AES256-SHA1 AES(256)_ HIGH_ ADH-CAMELLIA128-ADH-AES256-SHA DH None ADH-AES256-SHA1

Camellia(128)_ MEDIUM_ ADH-CAMELLIA256-SHA DH None SHA1 Camellia(256)_ HIGH_ ADH-SEED-SHA DH None SHA1 SEED(128)_ MEDIUM_

TLSv1_SUPPORTS_CIPHERS_WITH_NO_AUTHENTICATION _ _ _ _ _ ADH-RC4-MD5 DH None MD5 RC4(128) _MEDIUM_ ADH-DES-CBC3-SHA DH None SHA1 3DES(168) _HIGH_ ADH-AES128-SHA DH None SHA1 AES(128) _MEDIUM_ ADH-AES256-SHA DH None SHA1 AES(256) _HIGH_ ADH-CAMELLIA128-SHA DH None SHA1 Camellia(128) _MEDIUM_ ADH-CAMELLIA256-SHA DH None SHA1 Camellia(256) _HIGH_ ADH-SEED-SHA DH None SHA1 SEED(128) _MEDIUM_

Web Server Stopped Responding

CVEID:

(8)

QID: 74224 CVSS Base: 6.8 Category: Mail services Port: 110

QID: 74147 CVSS Base: 5.3

Category: Mail services Port: 25

TheWebserverstoppedrespondingto3consecutiveconnectionattemptsand/ormorethan 3consecutiveHTTPrequests.Consequently,theserviceabortedtestingforHTTP

vulnerabilities.Thevulnerabilitiesalreadydetectedarestillposted.

Impact:

TheservicewasunabletocompletetestingforHTTPvulnerabilitiessincetheWebserver stoppedresponding.

Solution:

ChecktheWebserverstatus.

IftheWebserverwascrashedduringthescan,pleaserestarttheserver,reporttheincident toCustomerSupportandstopscanningtheWebserveruntiltheissueisresolved.

IftheWebserverisunabletoprocessmultipleconcurrentHTTPrequests,pleaselowerthe scanharshnesslevelandlaunchanotherscan.Ifthisvulnerabilitycontinuestobereported, pleasecontactCustomerSupport.

Results:

The web server did not respond for 4 consecutive HTTP requests. After these, the service was still unable to connect to the web server 2 minutes later.

POP3 Server Allows Plain Text Authentication Vulnerability

CVEID:

-Threat:

Post Office Protocol version 3 (POP3) is an application layer internet standard protocol to retrieve e-mail from a remote server.

Use of the PASS command sends passwords in the clear over the network. Also, servers that answer -ERR to the User command are giving potential attackers clues about which names are valid.

Impact:

Malicious users could obtain mail server credentials by sniffing the traffic. This can allow unauthorized users to use the mail server as an open mail relay.

Solution:

POP3 supports several authentication methods to provide varying levels of protection. Contact your vendor for further configuration information.

Results:

Mail Server Accepts Plaintext Credentials

CVEID:

-Threat:

Your Mail Server responds to the EHLO command which implies that it uses the ESMTP protocol. ESMTP uses the AUTH command which indicates an authentication mechanism to the server. If the server supports the requested authentication mechanism, it performs an authentication protocol exchange to authenticate and identify the user. Optionally, it also negotiates a security layer for subsequent protocol interactions.

Your server accepts PLAIN or LOGIN as one of the AUTH parameters. The authentication credentials are transmitted in plaintext over the network and no encryption is performed.

Impact:

Malicious users could obtain mail server credentials by sniffing the traffic. This can allow unauthorized users to use the mail server as an open mail relay. It may also lead to compromise of account credentials that can be used to access other mail services like POP3 and IMAP.

(9)

QID: 5001 CVSS Base: 3.3 Category: Brute Force Attack Port: 80

QID: 5001 CVSS Base: 3.3

Category: Brute Force Attack Port: 443

Solution:

DisabletheplaintextauthenticationmethodsonyourSMTPserverforunencrypted (non-SSL/TLS)sessions.Youmayconsiderusingmoreadvancedchallenge-based

authenticationmethodslikeCRAM-MD5orDIGEST-MD5.

Pleasecontactyourvendorforconfigurationinformation.AlsocheckRFC2554andRFC 2487formoredetails.

Results:

EHLO 250-p3plcpnl0246.prod.phx3.secureserver.net Hello

[64.39.111.94] 250-SIZE 52428800 250-8BITMIME250-PIPELINING 250-AUTH PLAIN LOGIN 250-STARTTLS 250 HELP AUTH LOGIN 334VXNlcm5hbWU6 EHLO 250-p3plcpnl0246.prod.phx3.secureserver.net Hello

[64.39.111.94] 250-SIZE 52428800 250-8BITMIME 250-PIPELINING 250-AUTH PLAIN LOGIN 250-STARTTLS 250 HELP AUTH PLAIN 334

Discovery of Unix Account Names Vulnerability

CVEID: CVE-2001-1013 Threat:

When a request for a user is made (http://your.host/~user), certain servers (such as Apache Versions 1.3.12 and 1.3.9) return a different reply depending on whether the account user exists on the host or not.

If a request is made for an account that exists on the host, a 403 error is returned. If a request is made for a non-existent account, then a 404 error is returned.

Impact:

Unauthorized remote users can implement brute force attacks on the Web server to guess a valid account name on the server. Even though they may be successful in obtaining a valid account, they will still have to guess the password. However, if user passwords are weak, some services may also be brute forced.

Solution:

Disable the default-enabled "UserDir" directive. To do so, add the following line to the httpd.conf file:

UserDir Disabled

Apache Versions 1.3.9 and 1.3.12 are vulnerable. Other Web servers may also be

vulnerable. There are currently no patches available. We strongly advise you to upgrade to a later version of Apache.

Results:

#table cols="2" N._Server Account root operator

Discovery of Unix Account Names Vulnerability

CVEID: CVE-2001-1013 Threat:

When a request for a user is made (http://your.host/~user), certain servers (such as Apache Versions 1.3.12 and 1.3.9) return a different reply depending on whether the account user exists on the host or not.

If a request is made for an account that exists on the host, a 403 error is returned. If a request is made for a non-existent account, then a 404 error is returned.

Impact:

Unauthorized remote users can implement brute force attacks on the Web server to guess a valid account name on the server. Even though they may be successful in obtaining a valid account, they will still have to guess the password. However, if user passwords are weak, some services may also be brute forced.

(10)

QID: 74147 CVSS Base: 5.3 Category: Mail services Port: 587

QID: 86476 CVSS Base: 2.3

Category: Web server Port: 80

Solution:

Disable the default-enabled "UserDir" directive. To do so, add the following line to the httpd.conf file:

UserDir Disabled

Apache Versions 1.3.9 and 1.3.12 are vulnerable. Other Web servers may also be

vulnerable. There are currently no patches available. We strongly advise you to upgrade to a later version of Apache.

Results:

#table cols="2" N._Server Account root

Mail Server Accepts Plaintext Credentials

CVEID:

-Threat:

Your Mail Server responds to the EHLO command which implies that it uses the ESMTP protocol. ESMTP uses the AUTH command which indicates an authentication mechanism to the server. If the server supports the requested authentication mechanism, it performs an authentication protocol exchange to authenticate and identify the user. Optionally, it also negotiates a security layer for subsequent protocol interactions.

Your server accepts PLAIN or LOGIN as one of the AUTH parameters. The authentication credentials are transmitted in plaintext over the network and no encryption is performed.

Impact:

Malicious users could obtain mail server credentials by sniffing the traffic. This can allow unauthorized users to use the mail server as an open mail relay. It may also lead to compromise of account credentials that can be used to access other mail services like POP3 and IMAP.

Solution:

Disable the plaintext authentication methods on your SMTP server for unencrypted (non-SSL/TLS) sessions. You may consider using more advanced challenge-based

authentication methods like CRAM-MD5 or DIGEST-MD5.

Please contact your vendor for configuration information. Also check RFC 2554 and RFC 2487 for more details.

Results:

EHLO qualysguard.com 250-p3plcpnl0246.prod.phx3.secureserver.net Hello sn094.s01.sjc01.qualys.com [64.39.111.94] 250-SIZE 52428800 250-8BITMIME 250-PIPELINING 250-AUTH PLAIN LOGIN 250-STARTTLS 250 HELP AUTH LOGIN 334 VXNlcm5hbWU6 EHLO qualysguard.com

250-p3plcpnl0246.prod.phx3.secureserver.net Hello sn094.s01.sjc01.qualys.com [64.39.111.94] 250-SIZE 52428800 250-8BITMIME 250-PIPELINING 250-AUTH PLAIN LOGIN 250-STARTTLS 250 HELP AUTH PLAIN 334

Web Server Stopped Responding

CVEID:

-Threat:

TheWebserverstoppedrespondingto3consecutiveconnectionattemptsand/ormorethan 3consecutiveHTTPrequests.Consequently,theserviceabortedtestingforHTTP

vulnerabilities.Thevulnerabilitiesalreadydetectedarestillposted.

Impact:

TheservicewasunabletocompletetestingforHTTPvulnerabilitiessincetheWebserver stoppedresponding.

Solution:

(11)

10/6/2014

QID: 42366 CVSS Base:

Category: General remote services Port: 443

IftheWebserverwascrashedduringthescan,pleaserestarttheserver,reporttheincident toCustomerSupportandstopscanningtheWebserveruntiltheissueisresolved.

IftheWebserverisunabletoprocessmultipleconcurrentHTTPrequests,pleaselowerthe scanharshnesslevelandlaunchanotherscan.Ifthisvulnerabilitycontinuestobereported, pleasecontactCustomerSupport.

Results:

The web server did not respond for 4 consecutive HTTP requests. After these, the service was still unable to connect to the web server 2 minutes later.

SSLv3.0/TLSv1.0 Protocol Weak CBC Mode Vulnerability

CVEID: CVE-2011-3389 Threat:

SSLv 3.0 and TLS v1.0 protocols are used to provide integrity, authenticity and privacy to other protocols such as HTTP and LDAP. They provide these services by using encryption for privacy, x509 certificates for authenticity and one-way hash functions for integrity. To encrypt data SSL and TLS can use block ciphers, which are encryption algorithms that can encrypt only a fixed block of original data to an encrypted block of the same size. Note that these ciphers will always obtain the same resulting block for the same original block of data. To achieve difference in the output the output of encryption is XORed with yet another block of the same size referred to as initialization vectors (IV). A special mode of operation for block ciphers known as CBC (cipher block chaining) uses one IV for the initial block and the result of the previous block for each subsequent block to obtain difference in the output of block cipher encryption.

In SSLv3.0 and TLSv1.0 implementation the choice CBC mode usage was poor because the entire traffic shares one CBC session with single set of initial IVs. The rest of the IV are as mentioned above results of the encryption of the previous blocks. The subsequent IV are available to the eavesdroppers. This allows an attacker with the capability to inject arbitrary traffic into the plain-text stream (to be encrypted by the client) to verify their guess of the plain-text preceding the injected block. If the attackers guess is correct then the output of the encryption will be the same for two blocks.

For low entropy data it is possible to guess the plain-text block with relatively few number of attempts. For example for data that has 1000 possibilities the number of attempts can be 500.

For more information please see a paper by Gregory V. Bard. Impact:

Recently attacks against the web authentication cookies have been described which used this vulnerability. If the authentication cookie is guessed by the attacker then the attacker can impersonate the legitimate user on the Web site which accepts the authentication cookie.

Solution:

This attack was identified in 2004 and later revisions of TLS protocol which contain a fix for this. If possible, upgrade to TLSv1.1 or TLSv1.2. If upgrading to TLSv1.1 or TLSv1.2 is not possible, then disabling CBC mode ciphers will remove the vulnerability.

Setting your SSL server to prioritize RC4 ciphers mitigates this vulnerability. Microsoft has posted information including workarounds for IIS at KB2588513.

Using the following SSL configuration in Apache mitigates this vulnerability: SSLHonorCipherOrder On

SSLCipherSuite RC4-SHA:HIGH:!ADH

Qualys SSL/TLS Deployment Best Practices can be found here.

Note: RC4 recommendation is only in situations where upgrade to TLSv1.2 is not possible. RC4 in TLS v1.0 has output bias problem as described in QID 38601. Therefore it is recommended to upgrade to TLS v1.2 or later.

Results:

#table cols="3" Available_non_CBC_cipher Server's_choice SSL_version RC4-SHA ECDHE-RSA-DES-CBC3-RC4-SHA TLSv1

(12)

10/6/2014

Category: Web server Port: 0

QID: 38170 CVSS Base: 2.6

Category: General remote services Port: 143

ApachePartialHTTPRequestDenialofServiceVulnerability-ZeroDay

QID:86847 CVSSBase:7.8

CVEID: CVE-2007-6750 Threat:

The Apache HTTP Server, commonly referred to as Apache is a freely available Web server.

Apache is vulnerable to a denial of service due to holding a connection open for partial HTTP requests.

Apache Versions 1.x and 2.x are vulnerable.

Impact:

A remote attacker can cause a denial of service against the Web server which would prevent legitimate users from accessing the site.

Denial of service tools and scripts such as Slowloris takes advantage of this vulnerability.

Solution:

Patch

-There are no vendor-supplied patches available at this time. Workaround:

- Server-specific recommendations can be found here. - Countermeasures for Apache are described here.

- Reverse proxies, load balancers and iptables can help to prevent this attack from occurring.

- Adjusting the TimeOut Directive can also prevent this attack from occurring.

- A new module mod_reqtimeout has been introduced since Apache 2.2.15 to provide tools for mitigation against these forms of attack.

Also refer to Cert Blog and Slowloris and Mitigations for Apache document for further information.

Results:

QID: 86847 detected on port 80 over TCP - Apache 2.0QID: 86847 detected on port 443 over TCP - Apache 2.0

Type: Vulnerability

SSL Certificate - Subject Common Name Does Not Match Server FQDN

CVEID:

-Threat:

An SSL Certificate associates an entity (person, organization, host, etc.) with a Public Key. In an SSL connection, the client authenticates the remote server using the server's

Certificate and extracts the Public Key in the Certificate to establish the secure connection. A certificate whose Subject commonName or subjectAltName does not match the server FQDN offers only encryption without authentication.

Please note that a false positive reporting of this vulnerability is possible in the following case:

If the common name of the certificate uses a wildcard such as *.somedomainname.com and the reverse DNS resolution of the target IP is not configured. In this case there is no way for Qualys to associate the wildcard common name to the IP. Adding a reverse DNS lookup entry to the target IP will solve this problem.

Impact:

A man-in-the-middle attacker can exploit this vulnerability in tandem with a DNS cache poisoning attack to lure the client to another server, and then steal all the encryption communication.

Solution:

Please install a server certificate whose Subject commonName or subjectAltName matches the server FQDN.

(13)

QID: 38173 CVSS Base: 3.7 Category: General remote services Port: 21

QID: 38170 CVSS Base: 2.6

Category: General remote services Port: 587

Results:

Certificate #0

CN=*.prod.phx3.secureserver.net,O=Special_Domain_Services\,_LLC,ST=Arizona ,C=US (*.prod.phx3.secureserver.net) doesn't resolve

(prod.phx3.secureserver.net) doesn't resolve (*.prod.phx3.secureserver.net) doesn't resolve

SSL Certificate - Signature Verification Failed Vulnerability

CVEID:

-Threat:

An SSL Certificate associates an entity (person, organization, host, etc.) with a Public Key. In an SSL connection, the client authenticates the remote server using the server's

Certificate and extracts the Public Key in the Certificate to establish the secure connection. The authentication is done by verifying that the public key in the certificate is signed by a trusted third-party Certificate Authority.

If a client is unable to verify the certificate, it can abort communication or prompt the user to continue the communication without authentication.

Impact:

By exploiting this vulnerability, man-in-the-middle attacks in tandem with DNS cache poisoning can occur.

Exception:

If the server communicates only with a restricted set of clients who have the server

certificate or the trusted CA certificate, then the server or CA certificate may not be available publicly, and the scan will be unable to verify the signature.

Solution:

Please install a server certificate signed by a trusted third-party Certificate Authority.

Results:

Certificate #0

emailAddress=ssl@p3plcpnl0246.prod.phx3.secureserver.net,CN=p3plcpnl0246.p rod.phx3.secureserver.net self signed certificate

SSL Certificate - Subject Common Name Does Not Match Server FQDN

CVEID:

-Threat:

AnSSLCertificateassociatesanentity(person,organization,host,etc.)withaPublicKey. InanSSLconnection,theclientauthenticatestheremoteserverusingtheserver's

CertificateandextractsthePublicKeyintheCertificatetoestablishthesecureconnection. AcertificatewhoseSubjectcommonNameorsubjectAltNamedoesnotmatchtheserver FQDNoffersonlyencryptionwithoutauthentication.

Pleasenotethatafalsepositivereportingofthisvulnerabilityispossibleinthefollowing case:

Ifthecommonnameofthecertificateusesawildcardsuchas*.somedomainname.comand thereverseDNSresolutionofthetargetIPisnotconfigured.Inthiscasethereisnowayfor QualystoassociatethewildcardcommonnametotheIP.AddingareverseDNSlookup entrytothetargetIPwillsolvethisproblem.

Impact:

Aman-in-the-middleattackercanexploitthisvulnerabilityintandemwithaDNScache poisoningattacktoluretheclienttoanotherserver,andthenstealalltheencryption communication.

Solution:

PleaseinstallaservercertificatewhoseSubjectcommonNameorsubjectAltNamematches theserverFQDN.

(14)

QID: 38172 CVSS Base: 5 Category: General remote services Port: 21

QID: 38170 CVSS Base: 2.6

Category: General remote services Port: 110

Results:

Certificate #0

CN=*.prod.phx3.secureserver.net,O=Special_Domain_Services\,_LLC,ST=Arizona ,C=US (*.prod.phx3.secureserver.net) doesn't resolve

(prod.phx3.secureserver.net) doesn't resolve (*.prod.phx3.secureserver.net) doesn't resolve

Type: Vulnerability

SSL Certificate - Improper Usage Vulnerability

CVEID:

-Threat:

An SSL Certificate associates an entity (person, organization, host, etc.) with a Public Key. In an SSL connection, the client authenticates the remote server using the server's

Certificate and extracts the Public Key in the Certificate to establish the secure connection. The basicConstraints section of the certificate may specify if it is a Certificate Authority (CA) certificate. Also, the keyUsage field in the X509v3 extensions section of the certificate, if present, may restrict the usage of the certificate.

In general, a server public key should not be used for Certificate or CRL signing and a client or CA certificate should be not used as a server certificate.

Impact:

If the keyUsage or the basicConstraint field is designated as a critical parameter in the certificate, the client may abort the communication if the usage validation fails.

Solution:

Please install a server certificate with correct usage.

Results:

Certificate #0

emailAddress=ssl@p3plcpnl0246.prod.phx3.secureserver.net,CN=p3plcpnl0246.p rod.phx3.secureserver.net is not suitable for CRL signing.

Type: Vulnerability

SSL Certificate - Subject Common Name Does Not Match Server FQDN

CVEID:

-Threat:

An SSL Certificate associates an entity (person, organization, host, etc.) with a Public Key. In an SSL connection, the client authenticates the remote server using the server's

Certificate and extracts the Public Key in the Certificate to establish the secure connection. A certificate whose Subject commonName or subjectAltName does not match the server FQDN offers only encryption without authentication.

Please note that a false positive reporting of this vulnerability is possible in the following case:

If the common name of the certificate uses a wildcard such as *.somedomainname.com and the reverse DNS resolution of the target IP is not configured. In this case there is no way for Qualys to associate the wildcard common name to the IP. Adding a reverse DNS lookup entry to the target IP will solve this problem.

Impact:

A man-in-the-middle attacker can exploit this vulnerability in tandem with a DNS cache poisoning attack to lure the client to another server, and then steal all the encryption

(15)

QID: 38170 CVSS Base: 2.6 Category: General remote services Port: 995

QID: 38170 CVSS Base: 2.6

Category: General remote services Port: 465 communication.

Solution:

Please install a server certificate whose Subject commonName or subjectAltName matches the server FQDN.

Results:

Certificate #0

CN=*.prod.phx3.secureserver.net,O=Special_Domain_Services\,_LLC,ST=Arizona ,C=US (*.prod.phx3.secureserver.net) doesn't resolve

(prod.phx3.secureserver.net) doesn't resolve (*.prod.phx3.secureserver.net) doesn't resolve

SSL Certificate - Subject Common Name Does Not Match Server FQDN

CVEID:

-Threat:

An SSL Certificate associates an entity (person, organization, host, etc.) with a Public Key. In an SSL connection, the client authenticates the remote server using the server's

Certificate and extracts the Public Key in the Certificate to establish the secure connection. A certificate whose Subject commonName or subjectAltName does not match the server FQDN offers only encryption without authentication.

Please note that a false positive reporting of this vulnerability is possible in the following case:

If the common name of the certificate uses a wildcard such as *.somedomainname.com and the reverse DNS resolution of the target IP is not configured. In this case there is no way for Qualys to associate the wildcard common name to the IP. Adding a reverse DNS lookup entry to the target IP will solve this problem.

Impact:

A man-in-the-middle attacker can exploit this vulnerability in tandem with a DNS cache poisoning attack to lure the client to another server, and then steal all the encryption communication.

Solution:

Please install a server certificate whose Subject commonName or subjectAltName matches the server FQDN.

Results:

Certificate #0

CN=*.prod.phx3.secureserver.net,O=Special_Domain_Services\,_LLC,ST=Arizona ,C=US (*.prod.phx3.secureserver.net) doesn't resolve

(prod.phx3.secureserver.net) doesn't resolve (*.prod.phx3.secureserver.net) doesn't resolve

SSL Certificate - Subject Common Name Does Not Match Server FQDN

CVEID:

-Threat:

AnSSLCertificateassociatesanentity(person,organization,host,etc.)withaPublicKey. InanSSLconnection,theclientauthenticatestheremoteserverusingtheserver's

CertificateandextractsthePublicKeyintheCertificatetoestablishthesecureconnection. AcertificatewhoseSubjectcommonNameorsubjectAltNamedoesnotmatchtheserver FQDNoffersonlyencryptionwithoutauthentication.

Pleasenotethatafalsepositivereportingofthisvulnerabilityispossibleinthefollowing case:

Ifthecommonnameofthecertificateusesawildcardsuchas*.somedomainname.comand thereverseDNSresolutionofthetargetIPisnotconfigured.Inthiscasethereisnowayfor QualystoassociatethewildcardcommonnametotheIP.AddingareverseDNSlookup

(16)

10/6/2014

QID: 38170 CVSS Base: 2.6

Category: General remote services Port: 25

QID: 38170 CVSS Base: 2.6

Category: General remote services Port: 21

entrytothetargetIPwillsolvethisproblem.

Impact:

A man-in-the-middle attacker can exploit this vulnerability in tandem with a DNS cache poisoning attack to lure the client to another server, and then steal all the encryption communication.

Solution:

Please install a server certificate whose Subject commonName or subjectAltName matches the server FQDN.

Results:

Certificate #0

CN=*.prod.phx3.secureserver.net,O=Special_Domain_Services\,_LLC,ST=Arizona ,C=US (*.prod.phx3.secureserver.net) doesn't resolve

(prod.phx3.secureserver.net) doesn't resolve (*.prod.phx3.secureserver.net) doesn't resolve

SSL Certificate - Subject Common Name Does Not Match Server FQDN

CVEID:

-Threat:

An SSL Certificate associates an entity (person, organization, host, etc.) with a Public Key. In an SSL connection, the client authenticates the remote server using the server's

Certificate and extracts the Public Key in the Certificate to establish the secure connection. A certificate whose Subject commonName or subjectAltName does not match the server FQDN offers only encryption without authentication.

Please note that a false positive reporting of this vulnerability is possible in the following case:

If the common name of the certificate uses a wildcard such as *.somedomainname.com and the reverse DNS resolution of the target IP is not configured. In this case there is no way for Qualys to associate the wildcard common name to the IP. Adding a reverse DNS lookup entry to the target IP will solve this problem.

Impact:

A man-in-the-middle attacker can exploit this vulnerability in tandem with a DNS cache poisoning attack to lure the client to another server, and then steal all the encryption communication.

Solution:

Please install a server certificate whose Subject commonName or subjectAltName matches the server FQDN.

Results:

Certificate #0

CN=*.prod.phx3.secureserver.net,O=Special_Domain_Services\,_LLC,ST=Arizona ,C=US (*.prod.phx3.secureserver.net) doesn't resolve

(prod.phx3.secureserver.net) doesn't resolve (*.prod.phx3.secureserver.net) doesn't resolve

SSL Certificate - Subject Common Name Does Not Match Server FQDN

CVEID:

-Threat:

AnSSLCertificateassociatesanentity(person,organization,host,etc.)withaPublicKey. InanSSLconnection,theclientauthenticatestheremoteserverusingtheserver's

CertificateandextractsthePublicKeyintheCertificatetoestablishthesecureconnection. AcertificatewhoseSubjectcommonNameorsubjectAltNamedoesnotmatchtheserver FQDNoffersonlyencryptionwithoutauthentication.

(17)

10/6/2014

QID: 45002 CVSS Base: 5

Category: Information gathering Port: 0

Pleasenotethatafalsepositivereportingofthisvulnerabilityispossibleinthefollowing

case:

If the common name of the certificate uses a wildcard such as *.somedomainname.com and the reverse DNS resolution of the target IP is not configured. In this case there is no way for Qualys to associate the wildcard common name to the IP. Adding a reverse DNS lookup entry to the target IP will solve this problem.

Impact:

A man-in-the-middle attacker can exploit this vulnerability in tandem with a DNS cache poisoning attack to lure the client to another server, and then steal all the encryption communication.

Solution:

Please install a server certificate whose Subject commonName or subjectAltName matches the server FQDN.

Results:

Certificate #0

emailAddress=ssl@p3plcpnl0246.prod.phx3.secureserver.net,CN=p3plcpnl0246.p rod.phx3.secureserver.net (p3plcpnl0246.prod.phx3.secureserver.net) and IP (192.186.195.70) don't match

Type: Vulnerability

Global User List

CVEID:

-Threat:

This is the global system user list, which was retrieved during the scan by exploiting one or more vulnerabilities. The Qualys IDs for the vulnerabilities leading to the disclosure of these users are also given in the Result section. Each user will be displayed only once, even though it may be obtained by using different methods.

Impact:

These common account(s) can be used by a malicious user to break-in the system via password bruteforcing.

Solution:

To prevent your host from being attacked, do one or more of the following: Remove (or rename) unnecessary accounts

Shutdown unnecessary network services

Ensure the passwords to these accounts are kept secret

Use a firewall to restrict access to your hosts from unauthorized domains

Results:

#table cols="2" User_Name Source_Vulnerability_(QualysID) root 5001 operator 5001

Type: Vulnerability

SSLCertificate-Self-SignedCertificate

QID:38169 CVSSBase:1.9 Category:Generalremoteservices Port:21

CVEID:

-Threat:

AnSSLCertificateassociatesanentity(person,organization,host,etc.)withaPublicKey. InanSSLconnection,theclientauthenticatestheremoteserverusingtheserver's

(18)

10/6/2014

QID: 38170 CVSS Base: 2.6

Category: General remote services Port: 443

QID: 38170 CVSS Base: 2.6

Category: General remote services Port: 993

TheclientcantrustthattheServerCertificatebelongstheserveronlyifitissignedbya mutuallytrustedthird-partyCertificateAuthority(CA).Self-signedcertificatesarecreated generallyfortestingpurposesortoavoidpayingthird-partyCAs.Theseshouldnotbeused onanyproductionorcriticalservers.

Byexploitingthisvulnerability,anattackercanimpersonatetheserverbypresentingafake self-signedcertificate.Iftheclientknowsthattheserverdoesnothaveatrustedcertificate,it willacceptthisspoofedcertificateandcommunicatewiththeremoteserver.

Impact:

Byexploitingthisvulnerability,anattackercanlaunchaman-in-the-middleattack.

Solution:

Pleaseinstallaservercertificatesignedbyatrustedthird-partyCertificateAuthority.

Results:

Certificate #0

emailAddress=ssl@p3plcpnl0246.prod.phx3.secureserver.net,CN=p3plcpnl0246.p rod.phx3.secureserver.net is a self signed certificate.

SSL Certificate - Subject Common Name Does Not Match Server FQDN

CVEID:

-Threat:

An SSL Certificate associates an entity (person, organization, host, etc.) with a Public Key. In an SSL connection, the client authenticates the remote server using the server's

Certificate and extracts the Public Key in the Certificate to establish the secure connection. A certificate whose Subject commonName or subjectAltName does not match the server FQDN offers only encryption without authentication.

Please note that a false positive reporting of this vulnerability is possible in the following case:

If the common name of the certificate uses a wildcard such as *.somedomainname.com and the reverse DNS resolution of the target IP is not configured. In this case there is no way for Qualys to associate the wildcard common name to the IP. Adding a reverse DNS lookup entry to the target IP will solve this problem.

Impact:

A man-in-the-middle attacker can exploit this vulnerability in tandem with a DNS cache poisoning attack to lure the client to another server, and then steal all the encryption communication.

Solution:

Please install a server certificate whose Subject commonName or subjectAltName matches the server FQDN.

Results:

Certificate #0

CN=*.prod.phx3.secureserver.net,O=Special_Domain_Services\,_LLC,ST=Arizona ,C=US (*.prod.phx3.secureserver.net) doesn't resolve

(prod.phx3.secureserver.net) doesn't resolve (*.prod.phx3.secureserver.net) doesn't resolve

SSL Certificate - Subject Common Name Does Not Match Server FQDN

CVEID:

-Threat:

AnSSLCertificateassociatesanentity(person,organization,host,etc.)withaPublicKey. InanSSLconnection,theclientauthenticatestheremoteserverusingtheserver's

CertificateandextractsthePublicKeyintheCertificatetoestablishthesecureconnection. AcertificatewhoseSubjectcommonNameorsubjectAltNamedoesnotmatchtheserver

(19)

10/6/2014

QID: 19568 CVSS Base: 5

Category: Database Port: 3306

QID: 38601 CVSS Base:

Category: General remote services Port: 465

FQDNoffersonlyencryptionwithoutauthentication.

Pleasenotethatafalsepositivereportingofthisvulnerabilityispossibleinthefollowing case:

Ifthecommonnameofthecertificateusesawildcardsuchas*.somedomainname.comand thereverseDNSresolutionofthetargetIPisnotconfigured.Inthiscasethereisnowayfor QualystoassociatethewildcardcommonnametotheIP.AddingareverseDNSlookup entrytothetargetIPwillsolvethisproblem.

Impact:

Aman-in-the-middleattackercanexploitthisvulnerabilityintandemwithaDNScache poisoningattacktoluretheclienttoanotherserver,andthenstealalltheencryption communication.

Solution:

PleaseinstallaservercertificatewhoseSubjectcommonNameorsubjectAltNamematches theserverFQDN.

Results:

Certificate #0

CN=*.prod.phx3.secureserver.net,O=Special_Domain_Services\,_LLC,ST=Arizona ,C=US (*.prod.phx3.secureserver.net) doesn't resolve

(prod.phx3.secureserver.net) doesn't resolve (*.prod.phx3.secureserver.net) doesn't resolve

Type: Vulnerability

Database Instance Detected

CVEID:

-Threat:

The service detected a database installation on the target. Databases like Oracle, MS-SQL, MySQL, IBM DB2, PostGgresql, Firebird and other are detected. The database instance is listed in the result section below.

Impact:

N/A

Solution:

N/A

Results:

MYSQL instance detected on TCP port 3306.

SSL/TLS use of weak RC4 cipher

CVEID: CVE-2013-2566 Threat:

SecureSocketsLayer(SSLv2/v3)andTransportLayerSecurity(TLS)protocolsprovide integrity,confidentialityandauthenticityservicestootherprotocolsthatlackthesefeatures. SSL/TLSprotocolsusecipherssuchasAES,DES,3DESandRC4toencryptthecontentof thehigherlayerprotocolsandthusprovidetheconfidentialityservice.Normallytheoutputof anencryptionprocessisasequenceofrandomlookingbytes.ItwasknownthatRC4output hassomebiasintheoutput.Recentlyagroupofresearcheshasdiscoveredthatthethereis astrongerbiasinRC4,whichmakestatisticalanalysisofciphertextmorepractical.

Thedescribedattackistoinjectamaliciousjavascriptintothevictim'sbrowserthatwould ensurethattherearemultipleconnectionsbeingestablishedwithatargetwebsiteandthe sameHTTPcookieissentmultipletimestothewebsiteinencryptedform.Thisprovidesthe attackeralargesetofciphertextsamples,thatcanbeusedforstatisticalanalysis.

(20)

QID: 38601 CVSS Base: Category: General remote services Port: 995

QID: 38601 CVSS Base:

Category: General remote services Port: 443

Impact:

If this attack is carried out and an HTTP cookie is recovered, then the attacker can then use the cookie to impersonate the user whose cookie was recovered.

This attack is not very practical as it requires the attacker to have access to millions of samples of ciphertext, but there are certain assumptions that an attacker can make to improve the chances of recovering the cleartext from cihpertext. For examples HTTP cookies are either base64 encoded or hex digits. This information can help the attacker in their efforts to recover the cookie.

Solution:

RC4 should not be used where possible. One reason that RC4 was still being used was BEAST and Lucky13 attacks against CBC mode ciphers in SSL and TLS. However, TLSv 1.2 or later address these issues.

Results:

TLSv1.0 with RC4 ciphers is supported

SSL/TLS use of weak RC4 cipher

CVEID: CVE-2013-2566 Threat:

Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS ) protocols provide integrity, confidentiality and authenticity services to other protocols that lack these features. SSL/TLS protocols use ciphers such as AES,DES, 3DES and RC4 to encrypt the content of the higher layer protocols and thus provide the confidentiality service. Normally the output of an encryption process is a sequence of random looking bytes. It was known that RC4 output has some bias in the output. Recently a group of researches has discovered that the there is a stronger bias in RC4, which make statistical analysis of ciphertext more practical.

The described attack is to inject a malicious javascript into the victim's browser that would ensure that there are multiple connections being established with a target website and the same HTTP cookie is sent multiple times to the website in encrypted form. This provides the attacker a large set of ciphertext samples, that can be used for statistical analysis.

Impact:

If this attack is carried out and an HTTP cookie is recovered, then the attacker can then use the cookie to impersonate the user whose cookie was recovered.

This attack is not very practical as it requires the attacker to have access to millions of samples of ciphertext, but there are certain assumptions that an attacker can make to improve the chances of recovering the cleartext from cihpertext. For examples HTTP cookies are either base64 encoded or hex digits. This information can help the attacker in their efforts to recover the cookie.

Solution:

RC4 should not be used where possible. One reason that RC4 was still being used was BEAST and Lucky13 attacks against CBC mode ciphers in SSL and TLS. However, TLSv 1.2 or later address these issues.

Results:

TLSv1.0 with RC4 ciphers is supported

SSL/TLS use of weak RC4 cipher

CVEID: CVE-2013-2566 Threat:

SecureSocketsLayer(SSLv2/v3)andTransportLayerSecurity(TLS)protocolsprovide integrity,confidentialityandauthenticityservicestootherprotocolsthatlackthesefeatures. SSL/TLSprotocolsusecipherssuchasAES,DES,3DESandRC4toencryptthecontentof thehigherlayerprotocolsandthusprovidetheconfidentialityservice.Normallytheoutputof anencryptionprocessisasequenceofrandomlookingbytes.ItwasknownthatRC4output

(21)

10/6/2014

QID: 38601 CVSS Base:

Category: General remote services Port: 993

QID: 86477 CVSS Base:

Category: Web server Port: 80

hassomebiasintheoutput.Recentlyagroupofresearcheshasdiscoveredthatthethereis astrongerbiasinRC4,whichmakestatisticalanalysisofciphertextmorepractical.

Thedescribedattackistoinjectamaliciousjavascriptintothevictim'sbrowserthatwould ensurethattherearemultipleconnectionsbeingestablishedwithatargetwebsiteandthe sameHTTPcookieissentmultipletimestothewebsiteinencryptedform.Thisprovidesthe attackeralargesetofciphertextsamples,thatcanbeusedforstatisticalanalysis.

Impact:

IfthisattackiscarriedoutandanHTTPcookieisrecovered,thentheattackercanthenuse thecookietoimpersonatetheuserwhosecookiewasrecovered.

Thisattackisnotverypracticalasitrequirestheattackertohaveaccesstomillionsof samplesofciphertext,buttherearecertainassumptionsthatanattackercanmaketo improvethechancesofrecoveringthecleartextfromcihpertext.ForexamplesHTTP cookiesareeitherbase64encodedorhexdigits.Thisinformationcanhelptheattackerin theireffortstorecoverthecookie.

Solution:

RC4shouldnotbeusedwherepossible.OnereasonthatRC4wasstillbeingusedwas BEASTandLucky13attacksagainstCBCmodeciphersinSSLandTLS.However,TLSv 1.2orlateraddresstheseissues.

Results:

TLSv1.0 with RC4 ciphers is supported

SSL/TLS use of weak RC4 cipher

CVEID: CVE-2013-2566 Threat:

Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS ) protocols provide integrity, confidentiality and authenticity services to other protocols that lack these features. SSL/TLS protocols use ciphers such as AES,DES, 3DES and RC4 to encrypt the content of the higher layer protocols and thus provide the confidentiality service. Normally the output of an encryption process is a sequence of random looking bytes. It was known that RC4 output has some bias in the output. Recently a group of researches has discovered that the there is a stronger bias in RC4, which make statistical analysis of ciphertext more practical.

The described attack is to inject a malicious javascript into the victim's browser that would ensure that there are multiple connections being established with a target website and the same HTTP cookie is sent multiple times to the website in encrypted form. This provides the attacker a large set of ciphertext samples, that can be used for statistical analysis.

Impact:

If this attack is carried out and an HTTP cookie is recovered, then the attacker can then use the cookie to impersonate the user whose cookie was recovered.

This attack is not very practical as it requires the attacker to have access to millions of samples of ciphertext, but there are certain assumptions that an attacker can make to improve the chances of recovering the cleartext from cihpertext. For examples HTTP cookies are either base64 encoded or hex digits. This information can help the attacker in their efforts to recover the cookie.

Solution:

RC4 should not be used where possible. One reason that RC4 was still being used was BEAST and Lucky13 attacks against CBC mode ciphers in SSL and TLS. However, TLSv 1.2 or later address these issues.

Results:

TLSv1.0 with RC4 ciphers is supported

Apache Web Server ETag Header Information Disclosure Weakness

(22)

QID: 86477 CVSS Base: Category: Web server Port: 443

Threat:

The Apache HTTP Server is a popular, open-source HTTP server for multiple platforms, including Windows, Unix, and Linux.

A cache management feature for Apache makes use of an entity tag (ETag) header. When this option is enabled and a request is made for a document relating to a file, an ETag response header is returned containing various file attributes for caching purposes. ETag information allows subsequent file requests to contain specific information, such as the file's inode number.

A weakness has been found in the generation of ETag headers under certain configurations implementing the FileETag directive. Among the file attributes included in the header is the file inode number that is returned to a client.

Affected Versions:

By default, all Versions of Apache are vulnerable.

In Apache Versions 1.3.22 and earlier, it's not possible to disable inodes in in ETag headers to mitigate this vulnerability, so Apache Version 1.3.22 and earlier are vulnerable at all times.

Apache Version 1.3.23 and later have a setting that can be modified to remove the inode info from the ETag Headers to mitigate this vulnerability. Apache Versions >= 1.3.23 allow the user to configure what goes into ETag. However, if the user does not configure Apache to not include inode in ETag, the Web server can still be vulnerable even if Apache >= 1.3.23 is being used.

Impact:

This vulnerability poses a security risk, as the disclosure of inode information may aid in launching attacks against other network-based services. For instance, NFS uses inode numbers to generate file handles.

Solution:

Workaround:

For Apache 1.3.22 and earlier:

There is no patch or remediation available for Apache Versions 1.3.22 and earlier since it's not possible to disable inodes in in ETag headers. Customers running versions of Apache <= 1.3.22 will need to upgrade to a later version and then apply the settings listed below (see Apache Version 1.3.23 and later), as versions of Apache 1.3.22 and earlier do not have the ability to configure these setting.

For Apache 1.3.23 and later: In Apache Version 1.3.23 and later, it's possible to

configure the FileETag directive to generate ETag headers without inode information, which mitigates this vulnerability.

To do so, include "FileETag -INode" in the Apache server configuration file for a specific subdirectory.

In order to fix this vulnerability globally, for the Web server, use the option "FileETag None". Use the option "FileETag MTime Size" if you just want to remove the Inode information.

OpenBSD:

OpenBSD has released a patch that fixes this vulnerability. After installing the patch, inode numbers returned from the server are encoded using a private hash to avoid the release of sensitive information.

Results:

"646fa-7ab-500e0b4e5a84c"

Apache Web Server ETag Header Information Disclosure Weakness

CVEID: CVE-2003-1418 Threat:

TheApacheHTTPServerisapopular,open-sourceHTTPserverformultipleplatforms, includingWindows,Unix,andLinux.

AcachemanagementfeatureforApachemakesuseofanentitytag(ETag)header.When thisoptionisenabledandarequestismadeforadocumentrelatingtoafile,anETag responseheaderisreturnedcontainingvariousfileattributesforcachingpurposes.ETag informationallowssubsequentfilerequeststocontainspecificinformation,suchasthefile's inodenumber.

AweaknesshasbeenfoundinthegenerationofETagheadersundercertainconfigurations implementingtheFileETagdirective.Amongthefileattributesincludedintheheaderisthe fileinodenumberthatisreturnedtoaclient.

(23)

QID: 42017 CVSS Base: Category: General remote services Port: 0

Affected Versions:

By default, all Versions of Apache are vulnerable.

In Apache Versions 1.3.22 and earlier, it's not possible to disable inodes in in ETag headers to mitigate this vulnerability, so Apache Version 1.3.22 and earlier are vulnerable at all times.

Apache Version 1.3.23 and later have a setting that can be modified to remove the inode info from the ETag Headers to mitigate this vulnerability. Apache Versions >= 1.3.23 allow the user to configure what goes into ETag. However, if the user does not configure Apache to not include inode in ETag, the Web server can still be vulnerable even if Apache >= 1.3.23 is being used.

Impact:

This vulnerability poses a security risk, as the disclosure of inode information may aid in launching attacks against other network-based services. For instance, NFS uses inode numbers to generate file handles.

Solution:

Workaround:

For Apache 1.3.22 and earlier:

There is no patch or remediation available for Apache Versions 1.3.22 and earlier since it's not possible to disable inodes in in ETag headers. Customers running versions of Apache <= 1.3.22 will need to upgrade to a later version and then apply the settings listed below (see Apache Version 1.3.23 and later), as versions of Apache 1.3.22 and earlier do not have the ability to configure these setting.

For Apache 1.3.23 and later: In Apache Version 1.3.23 and later, it's possible to

configure the FileETag directive to generate ETag headers without inode information, which mitigates this vulnerability.

To do so, include "FileETag -INode" in the Apache server configuration file for a specific subdirectory.

In order to fix this vulnerability globally, for the Web server, use the option "FileETag None". Use the option "FileETag MTime Size" if you just want to remove the Inode information.

OpenBSD:

OpenBSD has released a patch that fixes this vulnerability. After installing the patch, inode numbers returned from the server are encoded using a private hash to avoid the release of sensitive information.

Results:

"646fa-7ab-500e0b4e5a84c"

Remote Access or Management Service Detected

CVEID:

-Threat:

A remote access or remote management service was detected. If such a service is accessible to malicious users it can be used to carry different type of attacks. Malicious users could try to brute force credentials or collect additional information on the service which could enable them in crafting further attacks.

The Results section includes information on the remote access service that was found on the target.

Services like Telnet, Rlogin, SSH, windows remote desktop, pcAnywhere, Citrix Management Console, Remote Admin (RAdmin), VNC, OPENVPN and ISAKMP are checked.

Impact:

Consequences vary by the type of attack.

Solution:

Expose the remote access or remote management services only to the system administrators or intended users of the system.

Results:

(24)

Category: Information gathering Port: 0

QID: 50000 CVSS Base:

Category: Mail services Port: 110

QID: 27113 CVSS Base: 4.9

Category: File Transfer Protocol Port: 21

RemoteManagementServiceAcceptingUnencryptedCredentialsDetected

QID:45194 CVSSBase:

CVEID:

-Threat:

A remote management service that accepts unencrypted credentials was detected on target host.

Services like Telnet, FTP, HTTP with basic auth are checked.

Impact:

If an attacker is able to intercept network traffic, he will gain access to the service credentials.

Solution:

Use alternate services that provide encryption if possible.

Results:

Service name: FTP on TCP port 21.

POP3 Banner CVEID: -Threat: Impact: Solution: Results:

+OK Dovecot ready.

FTP Server Banner

CVEID: CVE-1999-0614 Threat:

The following message is shown to all users logging on to your FTP server, including anonymous logins if they are allowed on your server.

Impact:

Unauthorized users can obtain sensitive information about your server, such as the version or type of server you are running, and use this information to implement specific attacks against the server.

Solution:

If possible, edit the configuration files or recompile the server to restrict the type of information disclosed.

Results:

220--- Welcome to Pure-FTPd [privsep] [TLS] --- 220-You are user number 2 of 500 allowed. 220-Local time is now 05:42. Server port: 21. 220-This is a private system - No anonymous login 220 You will be disconnected after 15 minutes of inactivity.

(25)

QID: 50010

Category: Mail services CVSSBase:

Port:993

QID: 45017 CVSS Base:

Category: Information gathering Port: 0

QID: 74042 CVSS Base:

Category: Mail services Port: 465 CVEID:

-Threat: Impact: Solution: Results:

* OK [CAPABILITY IMAP4rev1 LITERAL+ SASL-IR LOGIN-REFERRALS ID ENABLE IDLE NAMESPACE AUTH=PLAIN AUTH=LOGIN] Dovecot ready.

Operating System Detected

CVEID:

-Threat:

Several different techniques can be used to identify the operating system (OS) running on a host. A short description of these techniques is provided below. The specific technique used to identify the OS on this host is included in the RESULTS section of your report.

1) TCP/IP Fingerprint: The operating system of a host can be identified from a remote system using TCP/IP fingerprinting. All underlying operating system TCP/IP stacks have subtle differences that can be seen in their responses to specially-crafted TCP packets. According to the results of this "fingerprinting" technique, the OS version is among those listed below.

Note that if one or more of these subtle differences are modified by a firewall or a packet filtering device between the scanner and the host, the fingerprinting technique may fail. Consequently, the version of the OS may not be detected correctly. If the host is behind a proxy-type firewall, the version of the operating system detected may be that for the firewall instead of for the host being scanned.

2) NetBIOS: Short for Network Basic Input Output System, an application programming interface (API) that augments the DOS BIOS by adding special functions for local-area networks (LANs). Almost all LANs for PCs are based on the NetBIOS. Some LAN

manufacturers have even extended it, adding additional network capabilities. NetBIOS relies on a message format called Server Message Block (SMB).

3) PHP Info: PHP is a hypertext pre-processor, an open-source, server-side, HTML-embedded scripting language used to create dynamic Web pages. Under some

configurations it is possible to call PHP functions like phpinfo() and obtain operating system information.

4) SNMP: The Simple Network Monitoring Protocol is used to monitor hosts, routers, and the networks to which they attach. The SNMP service maintains Management Information Base (MIB), a set of variables (database) that can be fetched by Managers. These include "MIB_II.system.sysDescr" for the operating system.

Impact:

Not applicable.

Solution:

Not applicable.

Results:

#table cols="3" Operating_System Technique ID Ubuntu_/_Linux_2.6.x TCP/IP_Fingerprint U4856:21

SMTP Banner

(26)

-QID: 74042 CVSS Base: Category: Mail services Port: 587

QID: 74042 CVSS Base:

Category: Mail services Port: 25

QID: 50010 CVSS Base:

Category: Mail services Port: 143

Threat: Impact: Solution: Results:

220-p3plcpnl0246.prod.phx3.secureserver.net ESMTP Exim 4.82 #2 Mon, 06 Oct 2014 05:45:13 -0700 220-We do not authorize the use of this system to transport unsolicited, 220 and/or bulk e-mail.

SMTP Banner CVEID: -Threat: Impact: Solution: Results:

220-p3plcpnl0246.prod.phx3.secureserver.net ESMTP Exim 4.82 #2 Mon, 06 Oct 2014 05:45:18 -0700 220-We do not authorize the use of this system to transport unsolicited, 220 and/or bulk e-mail.

SMTP Banner CVEID: -Threat: Impact: Solution: Results:

220-p3plcpnl0246.prod.phx3.secureserver.net ESMTP Exim 4.82 #2 Mon, 06 Oct 2014 05:42:54 -0700 220-We do not authorize the use of this system to transport unsolicited, 220 and/or bulk e-mail.

IMAP Banner CVEID: -Threat: Impact: Solution: Results:

* OK [CAPABILITY IMAP4rev1 LITERAL+ SASL-IR LOGIN-REFERRALS ID ENABLE IDLE NAMESPACE STARTTLS AUTH=PLAIN AUTH=LOGIN] Dovecot ready.

(27)

QID: 50000

Category: Mail services CVSSBase:

Port:995

QID: 19000 CVSS Base:

Category: Database Port: 3306

QID: 74145 CVSS Base:

Category: Mail services Port: 465

QID: 74145 CVSS Base:

Category: Mail services Port: 25

POP3 Banner CVEID: -Threat: Impact: Solution: Results:

+OK Dovecot ready.

MySQL Banner CVEID: -Threat: Impact: Solution: Results: 5.5.35-cl SMTP Service Detected CVEID: -Threat:

The Mail Service on this host can be identified from a remote system using SMTP

fingerprinting. According to the results of this fingerprinting technique, the Mail Service name and version are listed below.

Impact: Solution: Results:

Name: Exim, Version: 4.24 or earlier

SMTP Service Detected

CVEID:

-Threat:

TheMailServiceonthishostcanbeidentifiedfromaremotesystemusingSMTP

fingerprinting.Accordingtotheresultsofthisfingerprintingtechnique,theMailServicename andversionarelistedbelow.

Impact: Solution:

(28)

QID: 82063 CVSS Base:

Category: TCP/IP Port: 0

QID: 74145 CVSS Base:

Category: Mail services Port: 587

QID: 86000 CVSS Base:

Category: Web server Port: 80

Results:

Name: Exim, Version: 4.24 or earlier

Host Uptime Based on TCP TimeStamp Option

CVEID:

-Threat:

The TCP/IP stack on the host supports the TCP TimeStamp (kind 8) option. Typically the timestamp used is the host's uptime (since last reboot) in various units (e.g., one hundredth of second, one tenth of a second, etc.). Based on this, we can obtain the host's uptime. The result is given in the Result section below.

Some operating systems (e.g., MacOS, OpenBSD) use a non-zero, probably random, initial value for the timestamp. For these operating systems, the uptime obtained does not reflect the actual uptime of the host; the former is always larger than the latter.

Impact:

N/A

Solution:

N/A

Results:

Based on TCP timestamps obtained via port 21, the host's uptime is 31 days, 11 hours, and 22 minutes. The TCP timestamps from the host are in units of 1 milliseconds.

SMTP Service Detected

CVEID:

-Threat:

The Mail Service on this host can be identified from a remote system using SMTP

fingerprinting. According to the results of this fingerprinting technique, the Mail Service name and version are listed below.

Impact: Solution: Results:

Name: Exim, Version: 4.24 or earlier

Web Server Version

CVEID: -Threat: N/A Impact: N/A Solution: N/A

(29)

QID: 82023 CVSS Base:

Category: TCP/IP Port: 0

QID: 86001 CVSS Base:

Category: Web server Port: 443

QID: 34011 CVSS Base:

Category: Firewall Port: 0

Results:

#table cols="2" Server_Version Server_Banner Apache_2.0 Apache_mod__fcgid/2.3.10-dev

Open TCP Services List

CVEID:

-Threat:

The port scanner enables unauthorized users with the appropriate tools to draw a map of all services on this host that can be accessed from the Internet. The test was carried out with a "stealth" port scanner so that the server does not log real connections.

The Results section displays the port number (Port), the default service listening on the port (IANA Assigned Ports/Services), the description of the service (Description) and the service that the scanner detected using service discovery (Service Detected).

Impact:

Unauthorized users can exploit this information to test vulnerabilities in each of the open services.

Solution:

Shut down any unknown or unused service on the list. If you have difficulty figuring out which service is provided by which process or program, contact your provider's support team. For more information about commercial and open-source Intrusion Detection Systems available for detecting port scanners of this kind, visit the CERT Web site .

Results:

#table cols="5" Port IANA_Assigned_Ports/Services Description

Service_Detected OS_On_Redirected_Port 21 ftp File_Transfer_[Control] ftp_ _ 25 smtp Simple_Mail_Transfer smtp_ _ 80 www World_Wide_Web_HTTP http_ _ 110 pop3 Post_Office_Protocol_-_Version_3 pop3_ _ 143 imap

Internet_Message_Access_Protocol imap_ _ 443 https http_protocol_over_TLS/SSL http_over_ssl _ 465 smtps

smtp_protocol_over_TLS/SSL_(was_ssmtp) smtp_over_ssl _ 587 submission Submission smtp_ _ 993 imaps imap4_protocol_over_TLS/SSL imap_over_ssl _ 995 pop3s pop3_protocol_over_TLS/SSL_(was_spop3) pop3_over_ssl _ 3306 mysql MySQL mysql_ _

SSL Web Server Version

CVEID:

-Threat: Impact: Solution: Results:

#table cols="2" Server_Version Server_Banner Apache_2.0 Apache_mod__fcgid/2.3.10-dev

Firewall Detected

(30)

-QID: 38116 CVSS Base: Category: General remote services Port: 587

Threat:

A packet filtering device protecting this IP was detected. This is likely to be a firewall or a router using access control lists (ACLs).

Impact: Solution: Results:

Some of the ports filtered by the firewall are: 20, 22, 23, 53, 111, 135, 445, 1, 7, 11. Listed below are the ports filtered by the firewall. No response has been received when any of these ports is probed.

1-3,5,7,9,11,13,15,17-20,22-24,27,29,31,33,35,37-39,41-79,81-109,111-142, 144-223,242-246,256-265,280-282,309,311,318,322-325,344-351,363,369-442, 444-464,466-581,592-593,598,600,606-620,624,627,631,633-637,666-674,700, 704-705,707,709-711,729-731,740-742,744,747-754,758-765,767,769-777,780-783, 786,799-801,860,873,886-888,900-901,911,950,954-955,990-992,996-1001, 1008,1010-1011,1015,1023-1100,1109-1112,1114,1123,1155,1167,1170,1207, 1212,1214,1220-1222,1234-1236,1241,1243,1245,1248,1269,1313-1314,1337, 1344-1625,1636-1774,1776-1815,1818-1824,1900-1909,1911-1920,1944-1951, 1973,1981,1985-2028,2030,2032-2036,2038,2040-2049,2053,2065,2067,2080, 2097, and more. We have omitted from this list 708 higher ports to keep the report size manageable.

SSL Server Information Retrieval

CVEID:

-Threat:

ThefollowingisalistofsupportedSSLciphers.Note:Ifacipherisincludedinthislistit meansthatitwaspossibletoestablishaSSLconnectionusingthatcipher.Therearesome webserverssetupsthatallowconnectionstobeestablishedusingaLOWgradecipher,only toprovideawebpagestatingthattheURLisaccessibleonlythroughanon-LOWgrade cipher.InthiscaseeventhoughLOWgradecipherwillbelistedhereQID38140willnotbe reported. Impact: N/A Solution: N/A Results: SSLv2_PROTOCOL_IS_DISABLED _ _ _ _ _ SSLv3_PROTOCOL_IS_ENABLED _ _ _ _ _ SSLv3 COMPRESSION_METHOD None _ _ _ RC4-MD5 RSA RSA MD5 RC4(128)_ MEDIUM_ RC4-SHA RSA RSA SHA1 RC4(128)_ MEDIUM_ IDEA-CBC-SHA RSA RSA SHA1

IDEA(128)_ MEDIUM_ DES-CBC3-SHA RSA RSA SHA1 3DES(168)_ HIGH_ EDH-RSA-DES-CBC3-SHA DH RSA SHA1 3DES(168)_ HIGH_ AES128-SHA RSA RSA SHA1 AES(128)_ MEDIUM_ DHE-RSA-AES128-SHA DH RSA SHA1 AES(128)_ MEDIUM_ AES256-SHA RSA RSA SHA1 AES(256)_ HIGH_ DHE-RSA-AES256-SHA DH RSA SHA1 AES(256)_ HIGH_ CAMELLIA128-SHA RSA RSA SHA1 Camellia(128)_ MEDIUM_ DHE-RSA-CAMELLIA128-SHA DH RSA SHA1 Camellia(128)_ MEDIUM_ CAMELLIA256-SHA RSA RSA SHA1 Camellia(256)_ HIGH_ DHE-RSA-CAMELLIA256-SHA DH RSA SHA1 Camellia(256)_ HIGH_ SEED-SHA RSA RSA SHA1 SEED(128)_ MEDIUM_ DHE-RSA-SEED-SHA DH RSA SHA1 SEED(128)_ MEDIUM_ TLSv1_PROTOCOL_IS_ENABLED _ _ _ _ _ TLSv1

COMPRESSION_METHOD None _ _ _ RC4-MD5 RSA RSA MD5 RC4(128) _MEDIUM_ RC4-SHA RSA RSA SHA1 RC4(128) _MEDIUM_ IDEA-CBC-SHA RSA RSA SHA1 IDEA(128) _MEDIUM_ DES-CBC3-SHA RSA RSA SHA1 3DES(168) _HIGH_ EDH-RSA-DES-CBC3-SHA DH RSA SHA1 3DES(168) _HIGH_ AES128-SHA RSA RSA SHA1 AES(128) _MEDIUM_ DHE-RSA-AES128-SHA DH RSA SHA1 AES(128) _MEDIUM_ AES256-SHA RSA RSA SHA1 AES(256) _HIGH_ DHE-RSA-AES256-SHA DH RSA SHA1 AES(256) _HIGH_

CAMELLIA128-SHA RSA RSA SHA1 Camellia(128) _MEDIUM_ DHE-RSA-CAMELLIA128-SHA DH RSA SHA1 Camellia(128) _MEDIUM_ CAMELLIA256-SHA RSA RSA SHA1 Camellia(256) _HIGH_ DHE-RSA-CAMELLIA256-SHA DH RSA SHA1 Camellia(256) _HIGH_ SEED-SHA RSA RSA SHA1 SEED(128) _MEDIUM_ DHE-RSA-SEED-SHA DH RSA SHA1 SEED(128) _MEDIUM_

References

Related documents

McCormick Place is proud to provide industry-leading, high quality wired and wireless internet services to meet the information needs of show managers, exhibitors,

Cisco SSL Encryption Utility Enable Transport Layer Security (TLS)

•  Authentication of server by client: can trust each data record came from server that holds private key matching public key in certificate. •  Authentication of client

Independent of certain mechanisms (encryption, compression, hash...) Transport Layer Network Layer. Can

disableCNCheck By default, when the TLS/SSL connection is setup, a check is done to see whether the SSL certificate of the EJBCA server is issued to the hostname (or IP) address of

Encryption keys are retrieved by user applications that open a secure SSL/TLS connection to the server, format a key retrieval request, send the request to the server, receive the

A total of 2428 publications has been analysed and revealed that the publication growth is highly inconsistent and in the year 2010, the highest number of papers

In a standard Administrative WebStation configuration for a secure Reflection session, the connection between the client and security proxy server is encrypted using SSL/TLS, but