Security Vulnerability issues
Posted: Tue Jun 09, 2015 4:27 pm
In our quarterly Nessus Vulnerability scan which is required by PCI, our new Nagios XI server was found with several security vulnerabilities.
All of these vulnerabilities are showing to be on TCP port 443 of our Nagios XI server.
1. Poodle: SSLv3 is showing to be enabled
Our httpd.conf file specifies: SSLProtocol all -SSLv2 -SSLv3
Found another forum: http://support.nagios.com/forum/viewtopic.php?f=16&t=29769&hilit=poodle
but this doesnt provide any solution. The person that submitted that topic appers to be in the same situation in that the conf file specified -sslv3, yet sslv3 is still enabled.
2. SSL RC4 Cipher Suites Supported
We have edited the httpd.conf file to exclude rc4, however after a reboot and rescan, the vulnerability is still being detected, so it must be enabled in some other config just like the above issue.
3. .svn/entries Disclosed via Web Server
Resolution should be something to the effect of "Configure permissions for the affected web server to deny access to the '.svn' directory."
I have been unable to find adequate info on this problem as it relates to Nagios XI
4. PHP expose_php Information Disclosure
I found instructions to edit the "/etc/php.ini" file and change "expose_php = On" to "expose_php = Off"
Are there any issues that may be caused by doing this?
5. HTTP TRACE / TRACK Methods Allowed. Disable these debug methods.
I can find no info regarding these methods as they relate to nagios and the location of the config files etc.
Any info on any of these security items would be greatly appreciated.
Thanks!!
-Richard B.
All of these vulnerabilities are showing to be on TCP port 443 of our Nagios XI server.
1. Poodle: SSLv3 is showing to be enabled
Our httpd.conf file specifies: SSLProtocol all -SSLv2 -SSLv3
Found another forum: http://support.nagios.com/forum/viewtopic.php?f=16&t=29769&hilit=poodle
but this doesnt provide any solution. The person that submitted that topic appers to be in the same situation in that the conf file specified -sslv3, yet sslv3 is still enabled.
2. SSL RC4 Cipher Suites Supported
We have edited the httpd.conf file to exclude rc4, however after a reboot and rescan, the vulnerability is still being detected, so it must be enabled in some other config just like the above issue.
3. .svn/entries Disclosed via Web Server
Resolution should be something to the effect of "Configure permissions for the affected web server to deny access to the '.svn' directory."
I have been unable to find adequate info on this problem as it relates to Nagios XI
4. PHP expose_php Information Disclosure
I found instructions to edit the "/etc/php.ini" file and change "expose_php = On" to "expose_php = Off"
Are there any issues that may be caused by doing this?
5. HTTP TRACE / TRACK Methods Allowed. Disable these debug methods.
I can find no info regarding these methods as they relate to nagios and the location of the config files etc.
Any info on any of these security items would be greatly appreciated.
Thanks!!
-Richard B.