Page 1 of 1

Nagios XI 5.5.6 many vulnerabilitys found from security scan

Posted: Wed Nov 14, 2018 1:45 am
by Nuggel1234
Hello,

we use nagios in a bigger company and get scanned our systems by a security department. We installed the newest update yesterday and unfortunality the scanner finds this vulernabilities, which need to be closed as soon as possbile.
Is there a way to fix them or when will there a update to fix them?

Thanks!

Date: 2018-11-13 18:21:27
Vuln#: 3PQ010005
Vulnerability: PHP Prior to 5.6.8/5.5.24/5.4.40 Multiple Remote Code Execution Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the PHP. For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Reference: h
Comment:
ScannerOutput:
Port: 443/tcp
PHP Multiple Remote Code Execution Vulnerabilities detected on port 443 over TCP.
----------------------------------------


Date: 2018-11-13 18:21:27
Vuln#: 3PQ010903
Vulnerability: PHP Versions Prior to 5.6.10/5.5.26/5.4.42 Multiple Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the PHP. For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.6.10, PHP 5.5.26, PHP 5.4.42 (PHP)
CertRef:
Tool Reference: Comment:
ScannerOutput:
Port: 443/tcp
PHP Versions Prior to 5.6.10/5.5.26/5.4.42 having Multiple Vulnerabilities detected on port 443 over TCP.
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 3PQ010903
Vulnerability: PHP Versions Prior to 5.6.10/5.5.26/5.4.42 Multiple Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the PHP. For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.6.10, PHP 5.5.26, PHP 5.4.42 (PHP)
CertRef:
Tool Reference: Comment:
ScannerOutput:
Port: 80/tcp
PHP Versions Prior to 5.6.10/5.5.26/5.4.42 having Multiple Vulnerabilities detected on port 80 over TCP.
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 2PQ011495
Vulnerability: PHP Versions Prior to 5.6.11/5.5.27/5.4.43 mysqlnd BACKRONYM Vulnerability
ToDo: Users are advised to upgrade to the latest version of the software.For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.6.11, PHP 5.5.27, PHP 5.4.43 (PHP)
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
PHP Versions Prior to 5.6.11/5.5.27/5.4.43 mysqlnd BACKRONYM Vulnerability detected on port 443 over TCP.
----------------------------------------


Date: 2018-11-13 18:21:27
Vuln#: 3PQ011628
Vulnerability: PHP Versions Prior to 5.6.13/5.5.29/5.4.45 Multiple Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the software.For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP Versions 5.6.13/5.5.29/5.4.45 (PHP)
CertRef:
Comment:
ScannerOutput:
Port: 443/tcp
PHP Versions Prior to 5.6.13/5.5.29/5.4.45 Multiple Vulnerabilities detected on port 443 over TCP.
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 3PQ011628
Vulnerability: PHP Versions Prior to 5.6.13/5.5.29/5.4.45 Multiple Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the software.For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP Versions 5.6.13/5.5.29/5.4.45 (PHP)
CertRef:
Tool Reference: Comment:
ScannerOutput:
Port: 80/tcp
PHP Versions Prior to 5.6.13/5.5.29/5.4.45 Multiple Vulnerabilities detected on port 80 over TCP.
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 3PQ011629
Vulnerability: PHP Versions Prior to 5.6.12/5.5.28/5.4.44 Multiple Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the software.For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.5.28/5.6.12/5.4.44 (php)
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
PHP Versions Prior to 5.6.12/5.5.28/5.4.44 Multiple Vulnerabilities detected on port 443 over TCP.
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 3PQ011629
Vulnerability: PHP Versions Prior to 5.6.12/5.5.28/5.4.44 Multiple Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the software.For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.5.28/5.6.12/5.4.44 (php)
CertRef:
Tool Refere
Comment:
ScannerOutput:
Port: 80/tcp
PHP Versions Prior to 5.6.12/5.5.28/5.4.44 Multiple Vulnerabilities detected on port 80 over TCP.
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 3PQ011630
Vulnerability: PHP Versions Prior to 5.6.7/5.5.23/5.4.39 Multiple Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the software. For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP Versions 5.6.7/5.5.23/5.4.39 (php)
CertRef:
Tool Reference: h
Comment:
ScannerOutput:
Port: 443/tcp
PHP Versions Prior to 5.6.7/5.5.23/5.4.39 Multiple Vulnerabilities detected on port 443 over TCP.
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 3PQ011630
Vulnerability: PHP Versions Prior to 5.6.7/5.5.23/5.4.39 Multiple Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the software. For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP Versions 5.6.7/5.5.23/5.4.39 (php)
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 80/tcp
PHP Versions Prior to 5.6.7/5.5.23/5.4.39 Multiple Vulnerabilities detected on port 80 over TCP.
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 3PQ011631
Vulnerability: PHP Versions Prior to 5.6.2/5.5.18/5.4.34 Multiple Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the software. For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.6.2/5.5.18/5.4.34 (php)
CertRef:
Tool Refe
Comment:
ScannerOutput:
Port: 443/tcp
PHP Versions Prior to 5.6.2/5.5.18/5.4.34 Multiple Vulnerabilities detected on port 443 over TCP.
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 3PQ011631
Vulnerability: PHP Versions Prior to 5.6.2/5.5.18/5.4.34 Multiple Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the software. For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.6.2/5.5.18/5.4.34 (php)
CertRef:
Tool Reference: Comment:
ScannerOutput:
Port: 80/tcp
PHP Versions Prior to 5.6.2/5.5.18/5.4.34 Multiple Vulnerabilities detected on port 80 over TCP.
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 3PQ011680
Vulnerability: PHP Stack-Based Buffer Overflow Multiple Vunerabilities
ToDo: PHP has released versions 5.6.24 and 7.0.9 to address these bugs as well as other vulnerabilities. Refer to PHP project main page at http://www.php.net/downloads.php to address this issue and obtain more information.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP ChangeLog 5.X: PHP 5.x PHP ChangeLog 7.X: PHP 7.x
CertRef:
Tool Reference
Comment:
ScannerOutput:
Port: 443/tcp
PHP Versions prior to 5.5.38, 5.6.24 or 7.0.9 detected on port 443 over TCP.
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 3PQ011680
Vulnerability: PHP Stack-Based Buffer Overflow Multiple Vunerabilities
ToDo: PHP has released versions 5.6.24 and 7.0.9 to address these bugs as well as other vulnerabilities. Refer to PHP project main page at http://www.php.net/downloads.php to address this issue and obtain more information.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP ChangeLog 5.X: PHP 5.x PHP ChangeLog 7.X: PHP 7.x
CertRef:
Tool ReferenceComment:
ScannerOutput:
Port: 80/tcp
PHP Versions prior to 5.5.38, 5.6.24 or 7.0.9 detected on port 80 over TCP.
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 2PQ012680
Vulnerability: HTTP TRACE / TRACK Methods Enabled
ToDo: Disable these methods in your web server's configuration file.
CertRef:
Tool Refer
Comment:
ScannerOutput:
Port: 443/tcp
TRACE /QUALYS12680.html HTTP/1.1
Host:



HTTP/1.1 200 OK
Date: Tue, 13 Nov 2018 18:23:31 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
Keep-Alive: timeout=5, max=96
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: message/http

TRACE /QUALYS12680.html HTTP/1.1
Host:
Connection: Keep-Alive
Qualys-Scan: VM

-CR-
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 2PQ012680
Vulnerability: HTTP TRACE / TRACK Methods Enabled
ToDo: Disable these methods in your web server's configuration file.
CertRef:
Tool Refere
Comment:
ScannerOutput:
Port: 80/tcp
TRACE /QUALYS12680.html HTTP/1.1
Host:



HTTP/1.1 200 OK
Date: Tue, 13 Nov 2018 18:23:58 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
Keep-Alive: timeout=5, max=96
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: message/http

TRACE /QUALYS12680.html HTTP/1.1
Host:
Connection: Keep-Alive
Qualys-Scan: VM

-CR-
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 2PQ012719
Vulnerability: PHP SSL Module NULL Byte Handling Vulnerability
ToDo: Upgrade to PHP 5.4.18 or PHP 5.5.2. Patch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.4.18 (PHP) PHP 5.5.2 (PHP)Virtual Patches:Trend Micro Virtual PatchingVirtual Patch #1005671: 1005671 - PHP SSL Module subjectAltNames NULL Byte Handling Security Vulnerability
CertRef:
Tool Referenc
Comment:
ScannerOutput:
Port: 443/tcp
Date: Tue, 13 Nov 2018 18:22:45 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8


----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 3PQ012722
Vulnerability: PHP Session Fixation Vulnerability
ToDo: Upgrade to PHP version 5.5.2 or above. For more details about PHP releases and patches please visit PHP Homepage. Additionally, customers may want to follow the following guidelines that would prevent such session fixation vulnerabilities:- Implement the session.use_strict_mod php.ini directive which when enabled, discards uninitialized session IDs.- Implement the session.safe_session_cookie directive that deletes possible malicious cookies, effectively preventing crafted session IDs.- Implement the session.use_trans_sid directive that prevents PHP applications from exposing the session identifier in a URL.- Implement the session.use_only_cookies php.ini directive that directs PHP to never use URLs with session identifiers.However, customers are advised to test their applications after applying these guidelines as they may affect application behaviour in certain cases.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.5.2
CertRef:
Tool Reference
Comment:
ScannerOutput:
Port: 443/tcp
Date: Tue, 13 Nov 2018 18:22:45 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8


----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 3PQ012722
Vulnerability: PHP Session Fixation Vulnerability
ToDo: Upgrade to PHP version 5.5.2 or above. For more details about PHP releases and patches please visit PHP Homepage. Additionally, customers may want to follow the following guidelines that would prevent such session fixation vulnerabilities:- Implement the session.use_strict_mod php.ini directive which when enabled, discards uninitialized session IDs.- Implement the session.safe_session_cookie directive that deletes possible malicious cookies, effectively preventing crafted session IDs.- Implement the session.use_trans_sid directive that prevents PHP applications from exposing the session identifier in a URL.- Implement the session.use_only_cookies php.ini directive that directs PHP to never use URLs with session identifiers.However, customers are advised to test their applications after applying these guidelines as they may affect application behaviour in certain cases.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.5.2
CertRef:
T
Comment:
ScannerOutput:
Port: 80/tcp
Date: Tue, 13 Nov 2018 18:22:44 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8


----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 3PQ012798
Vulnerability: PHP OpenSSL Extension Remote Memory Corruption Vulnerability
ToDo: Vendor has released fixed versions PHP 5.3.28, PHP 5.4.23 and PHP 5.5.7. For more details please refer to PHP Home.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.4.23 PHP 5.3.28 PHP 5.5.7
CertRef:
Tool RefeComment:
ScannerOutput:
Port: 443/tcp
Date: Tue, 13 Nov 2018 18:22:45 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8


----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 3PQ012798
Vulnerability: PHP OpenSSL Extension Remote Memory Corruption Vulnerability
ToDo: Vendor has released fixed versions PHP 5.3.28, PHP 5.4.23 and PHP 5.5.7. For more details please refer to PHP Home.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.4.23 PHP 5.3.28 PHP 5.5.7
CertRef:
Tool Reference
Comment:
ScannerOutput:
Port: 80/tcp
Date: Tue, 13 Nov 2018 18:22:44 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>

<div class=parentpage>

<div id=header
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 2PQ012808
Vulnerability: PHP Denial of Service Vulnerability
ToDo: Users are advised to upgrade to the latest version of PHP available. For more details about PHP releases and patches please visit PHP Homepage.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Reference: htt
Comment:
ScannerOutput:
Port: 443/tcp
Date: Tue, 13 Nov 2018 18:22:45 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>

<div class=parentpage>

<div id=header
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 2PQ012808
Vulnerability: PHP Denial of Service Vulnerability
ToDo: Users are advised to upgrade to the latest version of PHP available. For more details about PHP releases and patches please visit PHP Homepage.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Reference: htt
Comment:
ScannerOutput:
Port: 80/tcp
Date: Tue, 13 Nov 2018 18:22:44 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>

<div class=parentpage>

<div id=header
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 2PQ012868
Vulnerability: PHP Fileinfo libmagic Multiple Denial of Service Vulnerabilities
ToDo: Users are advised to upgrade to the latest version 5.5.10 or 5.4.26. Latest version can be downloaded from herePatch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Reference
Comment:
ScannerOutput:
Port: 443/tcp
Date: Tue, 13 Nov 2018 18:22:45 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>

<div class=parentpage>

<div id=header
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 2PQ012868
Vulnerability: PHP Fileinfo libmagic Multiple Denial of Service Vulnerabilities
ToDo: Users are advised to upgrade to the latest version 5.5.10 or 5.4.26. Latest version can be downloaded from herePatch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Reference: Comment:
ScannerOutput:
Port: 80/tcp
Date: Tue, 13 Nov 2018 18:22:44 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>

<div class=parentpage>

<div id=header
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 2PQ012913
Vulnerability: PHP 5.5.x And 5.4.x Denial Of Service Vulnerability
ToDo: Users are advised to upgrade to the latest version 5.5.11. Latest version can be downloaded from herePatch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.5.11
CertRef:
Tool Refe
Comment:
ScannerOutput:
Port: 443/tcp
Date: Tue, 13 Nov 2018 18:22:45 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>

<div class=parentpage>

<div id=header
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 2PQ012913
Vulnerability: PHP 5.5.x And 5.4.x Denial Of Service Vulnerability
ToDo: Users are advised to upgrade to the latest version 5.5.11. Latest version can be downloaded from herePatch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.5.11
CertRef:
Tool Reference:
ScannerOutput:
Port: 80/tcp
Date: Tue, 13 Nov 2018 18:22:44 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>

<div class=parentpage>

<div id=header
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 2PQ012969
Vulnerability: PHP CDF File Parsing Multiple Denial of Service Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the software available. For more information, please visit:PHP 5.4.29PHP 5.5.13Patch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Refere
Comment:
ScannerOutput:
Port: 443/tcp
Date: Tue, 13 Nov 2018 18:22:45 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>

<div class=parentpage>

<div id=header
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 2PQ012969
Vulnerability: PHP CDF File Parsing Multiple Denial of Service Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the software available. For more information, please visit:PHP 5.4.29PHP 5.5.13Patch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Referenc
Comment:
ScannerOutput:
Port: 80/tcp
Date: Tue, 13 Nov 2018 18:22:44 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>

<div class=parentpage>

<div id=header
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 3PQ013035
Vulnerability: PHP Prior to 5.4.32/5.5.16 Multiple Vulnerabilities
ToDo: Update to version 5.4.32 or 5.5.16. For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.5.16 PHP 5.4.32
CertRef:
Tool Reference: h
Comment:
ScannerOutput:
Port: 443/tcp
Date: Tue, 13 Nov 2018 18:22:45 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>

<div class=parentpage>

<div id=header
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 3PQ013035
Vulnerability: PHP Prior to 5.4.32/5.5.16 Multiple Vulnerabilities
ToDo: Update to version 5.4.32 or 5.5.16. For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.5.16 PHP 5.4.32
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 80/tcp
Date: Tue, 13 Nov 2018 18:22:44 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>

<div class=parentpage>

<div id=header
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 3PQ013083
Vulnerability: PHP unserialize() Use-After-Free Vulnerability
ToDo: Users are advised to upgrade to the latest version of the PHP.For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
QID: 13083 detected on port 443
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 3PQ013083
Vulnerability: PHP unserialize() Use-After-Free Vulnerability
ToDo: Users are advised to upgrade to the latest version of the PHP.For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Reference: Comment:
ScannerOutput:
Port: 80/tcp
QID: 13083 detected on port 80
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 2PQ013085
Vulnerability: PHP Denial of Service and Code Execution Vulnerability
ToDo: The vendor has confirmed the vulnerability, but no patch is available as of now, however vendor has released fixes for these vulnerabilities via snapshots/ revisions.Workaround:For more information regarding snapshot/revision download please visit PHP
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
QID: 13085 detected on port 443
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 2PQ013085
Vulnerability: PHP Denial of Service and Code Execution Vulnerability
ToDo: The vendor has confirmed the vulnerability, but no patch is available as of now, however vendor has released fixes for these vulnerabilities via snapshots/ revisions.Workaround:For more information regarding snapshot/revision download please visit PHP
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 80/tcp
QID: 13085 detected on port 80
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 3PQ013098
Vulnerability: PHP Multiple Remote Code Execution Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the PHP.For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Refere
Comment:
ScannerOutput:
Port: 443/tcp
PHP Multiple Remote Code Execution Vulnerabilities detected on port 443 over TCP.
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 3PQ013098
Vulnerability: PHP Multiple Remote Code Execution Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the PHP.For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Reference
Comment:
ScannerOutput:
Port: 80/tcp
PHP Multiple Remote Code Execution Vulnerabilities detected on port 80 over TCP.
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 3PQ013108
Vulnerability: PHP Multiple Remote Code Execution Vulnerabilities (GHOST)
ToDo: Users are advised to upgrade to the latest version of the PHP. For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Reference
Comment:
ScannerOutput:
Port: 443/tcp
PHP Multiple Remote Code Execution Vulnerabilities detected on port 443 over TCP.
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 3PQ013108
Vulnerability: PHP Multiple Remote Code Execution Vulnerabilities (GHOST)
ToDo: Users are advised to upgrade to the latest version of the PHP. For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Reference: /pub/QIDsearch?id=013108
Comment:
ScannerOutput:
Port: 80/tcp
PHP Multiple Remote Code Execution Vulnerabilities detected on port 80 over TCP.
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 2PQ038657
Vulnerability: Birthday attacks against TLS ciphers with 64bit block size vulnerability (Sweet32)
ToDo: Disable and stop using DES, 3DES, IDEA or RC2 ciphers.
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
CIPHER KEY-EXCHANGE AUTHENTICATION MAC ENCRYPTION(KEY-STRENGTH) GRADE
TLSv1 WITH 64-BIT CBC CIPHERS IS SUPPORTED
DES-CBC3-SHA RSA RSA SHA1 3DES(168) MEDIUM
EDH-RSA-DES-CBC3-SHA DH RSA SHA1 3DES(168) MEDIUM
ECDHE-RSA-DES-CBC3-SHA ECDH RSA SHA1 3DES(168) MEDIUM
TLSv1.1 WITH 64-BIT CBC CIPHERS IS SUPPORTED
DES-CBC3-SHA RSA RSA SHA1 3DES(168) MEDIUM
EDH-RSA-DES-CBC3-SHA DH RSA SHA1 3DES(168) MEDIUM
ECDHE-RSA-DES-CBC3-SHA ECDH RSA SHA1 3DES(168) MEDIUM
TLSv1.2 WITH 64-BIT CBC CIPHERS IS SUPPORTED
DES-CBC3-SHA RSA RSA SHA1 3DES(168) MEDIUM
EDH-RSA-DES-CBC3-SHA DH RSA SHA1 3DES(168) MEDIUM
ECDHE-RSA-DES-CBC3-SHA ECDH RSA SHA1 3DES(168) MEDIUM
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 2PQ086172
Vulnerability: Apache HTTP Server Prior to 2.4.16/2.2.31 Multiple Vulnerabilities
ToDo: These vulnerabilities have been patched in Apache. Refer to Apache httpd 2.4.16 Changelog and Apache httpd 2.2.31 Changelog or your Linux distro for further details.Patch:Following are links for downloading patches to fix the vulnerabilities: Apache 2.4.16/2.2.31: Apache
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
QID 86172 detected on port 443 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 2PQ086172
Vulnerability: Apache HTTP Server Prior to 2.4.16/2.2.31 Multiple Vulnerabilities
ToDo: These vulnerabilities have been patched in Apache. Refer to Apache httpd 2.4.16 Changelog and Apache httpd 2.2.31 Changelog or your Linux distro for further details.Patch:Following are links for downloading patches to fix the vulnerabilities: Apache 2.4.16/2.2.31: Apache
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 80/tcp
QID 86172 detected on port 80 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 1PQ086473
Vulnerability: Web Server HTTP Trace/Track Method Support Cross-Site Tracing Vulnerability
ToDo: Solutions for some of the common Web servers are supplied below. For other Web servers, please check your vendor's documentation.Apache: Recent Apache versions have a Rewrite module that allows HTTP requests to be rewritten or handled in a specific way. Compile the Apache server with the mod_rewrite module. You might need to uncomment the 'AddModule' and 'LoadModule' directives in the httpd.conf configuration file. Add the following lines for each virtualhost in your configuration file (Please note that, by default, Rewrite configurations are not inherited. This means that you need to have Rewrite directives for each virtual host in which you wish to use it):< IfModule mod_rewrite.c> RewriteEngine onRewriteCond %{REQUEST_METHOD} ^TRACERewriteRule .* - [F]< /IfModule> With this configuration, Apache catches all TRACE requests, and replies with a page reporting the request as forbidden. None of the original request's contents are echoed back.A slightly tighter fix is to use:<
IfModule mod_rewrite.c> RewriteEngine onRewriteCond %{REQUEST_METHOD} !^(GET|POST|HEAD)$RewriteRule .* - [F]< /IfModule> Please note that RewriteEngine can be processor intensive and may impact the web server performance. The trace method can also be controlled by use of the TraceEnable directive.In the httpd.conf add or modify:TraceEnable OffMicrosoft IIS: Microsoft released URLScan, which can be used to screen all incoming requests based on customized rulesets. URLScan can be used to sanitize or disable the TRACE requests from the clients. Note that IIS aliases 'TRACK' to 'TRACE'. Therefore, if URLScan is used to specfically block the TRACE method, the TRACK method should also be added to the filter.URLScan uses the 'urlscan.ini' configuration file, usually in \\System32\\InetSrv\\URLScan directory. In that, we have two sections - AllowVerbs and DenyVerbs. The former is used if the UseAllowVerbs variable is set to 1, else (if its set to 0), the DenyVerbs are used. Clearly, either
can be used, depending on whether we want a Default-Deny-Explicit-Allow or a Default-Allow-Explicit-Deny policy. To disallow TRACE and TRACK methods through URLScan, first remove 'TRACK', 'TRACE' methods from the 'AllowVerbs' section and add them to the 'DenyVerbs' section. With this, URLScan will disallow all 'TRACE' and 'TRACK' methods, and generate an error page for all requests using that method. To enable the changes, restart the 'World Wide Web Publishing Service' from the 'Services' Control Panel item.For more details about other web servers : Cert Advisory.
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
TRACE / HTTP/1.1
Host:
Via: <script>alert('QualysXSS');</script>



HTTP/1.1 200 OK
Date: Tue, 13 Nov 2018 18:23:29 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
Transfer-Encoding: chunked
Content-Type: message/http

TRACE / HTTP/1.1
Host:
Via: <script>alert('QualysXSS');</script>
Qualys-Scan: VM

-CR-TRACE / HTTP/1.0
Via: <script>alert('QualysXSS');</script>



HTTP/1.1 200 OK
Date: Tue, 13 Nov 2018 18:23:29 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Via: <script>alert('QualysXSS');</script>
Qualys-Scan: VM
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 1PQ086473
Vulnerability: Web Server HTTP Trace/Track Method Support Cross-Site Tracing Vulnerability
ToDo: Solutions for some of the common Web servers are supplied below. For other Web servers, please check your vendor's documentation.Apache: Recent Apache versions have a Rewrite module that allows HTTP requests to be rewritten or handled in a specific way. Compile the Apache server with the mod_rewrite module. You might need to uncomment the 'AddModule' and 'LoadModule' directives in the httpd.conf configuration file. Add the following lines for each virtualhost in your configuration file (Please note that, by default, Rewrite configurations are not inherited. This means that you need to have Rewrite directives for each virtual host in which you wish to use it):< IfModule mod_rewrite.c> RewriteEngine onRewriteCond %{REQUEST_METHOD} ^TRACERewriteRule .* - [F]< /IfModule> With this configuration, Apache catches all TRACE requests, and replies with a page reporting the request as forbidden. None of the original request's contents are echoed back.A slightly tighter fix is to use:<
IfModule mod_rewrite.c> RewriteEngine onRewriteCond %{REQUEST_METHOD} !^(GET|POST|HEAD)$RewriteRule .* - [F]< /IfModule> Please note that RewriteEngine can be processor intensive and may impact the web server performance. The trace method can also be controlled by use of the TraceEnable directive.In the httpd.conf add or modify:TraceEnable OffMicrosoft IIS: Microsoft released URLScan, which can be used to screen all incoming requests based on customized rulesets. URLScan can be used to sanitize or disable the TRACE requests from the clients. Note that IIS aliases 'TRACK' to 'TRACE'. Therefore, if URLScan is used to specfically block the TRACE method, the TRACK method should also be added to the filter.URLScan uses the 'urlscan.ini' configuration file, usually in \\System32\\InetSrv\\URLScan directory. In that, we have two sections - AllowVerbs and DenyVerbs. The former is used if the UseAllowVerbs variable is set to 1, else (if its set to 0), the DenyVerbs are used. Clearly, either
can be used, depending on whether we want a Default-Deny-Explicit-Allow or a Default-Allow-Explicit-Deny policy. To disallow TRACE and TRACK methods through URLScan, first remove 'TRACK', 'TRACE' methods from the 'AllowVerbs' section and add them to the 'DenyVerbs' section. With this, URLScan will disallow all 'TRACE' and 'TRACK' methods, and generate an error page for all requests using that method. To enable the changes, restart the 'World Wide Web Publishing Service' from the 'Services' Control Panel item.For more details about other web servers : Cert Advisory.
CertRef:
Tool Reference: Comment:
ScannerOutput:
Port: 80/tcp
TRACE / HTTP/1.1
Host:
Via: <script>alert('QualysXSS');</script>



HTTP/1.1 200 OK
Date: Tue, 13 Nov 2018 18:23:55 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
Transfer-Encoding: chunked
Content-Type: message/http

TRACE / HTTP/1.1
Host:
Via: <script>alert('QualysXSS');</script>
Qualys-Scan: VM

-CR-TRACE / HTTP/1.0
Via: <script>alert('QualysXSS');</script>



HTTP/1.1 200 OK
Date: Tue, 13 Nov 2018 18:23:55 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Via: <script>alert('QualysXSS');</script>
Qualys-Scan: VM
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 2PQ086488
Vulnerability: Apache HTTP Server Prior to 2.4.20 Thread Starvation Vulnerability
ToDo: These vulnerability have been patched in Apache 2.4.20. Refer to Apache httpd 2.4.20 Changelog or your Linux distro for further details.Patch:Following are links for downloading patches to fix the vulnerabilities: Apache 2.4.20: Apache 2.4.x
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
QID 86488 detected on port 443 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 2PQ086488
Vulnerability: Apache HTTP Server Prior to 2.4.20 Thread Starvation Vulnerability
ToDo: These vulnerability have been patched in Apache 2.4.20. Refer to Apache httpd 2.4.20 Changelog or your Linux distro for further details.Patch:Following are links for downloading patches to fix the vulnerabilities: Apache 2.4.20: Apache 2.4.x
CertRef:
Tool Reference: Comment:
ScannerOutput:
Port: 80/tcp
QID 86488 detected on port 80 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 3PQ086489
Vulnerability: Apache HTTP Server Prior to 2.4.12 Multiple Vulnerabilities
ToDo: These vulnerabilities have been patched in Apache 2.4.12. Refer to Apache httpd 2.4.12 Changelog or your Linux distro for further details.Patch:Following are links for downloading patches to fix the vulnerabilities: Apache 2.4.12: Apache 2.4.xVirtual Patches:Trend Micro Virtual PatchingVirtual Patch #1006305: 1006305 - Apache HTTP Server 'mod_cache' Denial Of Service Vulnerability
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
QID 86488 detected on port 443 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 3PQ086489
Vulnerability: Apache HTTP Server Prior to 2.4.12 Multiple Vulnerabilities
ToDo: These vulnerabilities have been patched in Apache 2.4.12. Refer to Apache httpd 2.4.12 Changelog or your Linux distro for further details.Patch:Following are links for downloading patches to fix the vulnerabilities: Apache 2.4.12: Apache 2.4.xVirtual Patches:Trend Micro Virtual PatchingVirtual Patch #1006305: 1006305 - Apache HTTP Server 'mod_cache' Denial Of Service Vulnerability
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 80/tcp
QID 86488 detected on port 80 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 2PQ086491
Vulnerability: Apache HTTP Server Remote Denial of Service Vulnerability
ToDo: The vulnerability have been patched in Apache 2.4.7. Refer to Apache httpd 2.4.7 Changelog or your Linux distro for further details.Patch:Following are links for downloading patches to fix the vulnerabilities: Apache 2.4.7: Apache 2.4.x
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
QID 86491 detected on port 443 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 2PQ086491
Vulnerability: Apache HTTP Server Remote Denial of Service Vulnerability
ToDo: The vulnerability have been patched in Apache 2.4.7. Refer to Apache httpd 2.4.7 Changelog or your Linux distro for further details.Patch:Following are links for downloading patches to fix the vulnerabilities: Apache 2.4.7: Apache 2.4.x
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 80/tcp
QID 86491 detected on port 80 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 2PQ086728
Vulnerability: Web Server Uses Plain-Text Form Based Authentication
ToDo: Please contact the vendor of the hardware/software for a possible fix for the issue. For custom applications, ensure that data sent via HTML login forms is encrypted before being sent from the client to the host.
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 80/tcp
GET /nagiosxi/login.php HTTP/1.1
Host
Connection: Keep-Alive

<form id=loginForm method=post action=/nagiosxi/login.php autocomplete='off'>
<input type=hidden name=nsp value=413b290a57c54b9cd1df0620bedff4f806950b6bd5e0bc869d3e8f250d9c3b9c>
<input type=hidden name=page value=auth>
<input type=hidden name=debug value=>
<input type=hidden name=pageopt value=login>



Login


<div style=margin-bottom: 10px;>
<input type=text class=form-control placeholder=Username value= name=username id=usernameBox autocomplete='off'>
</div>
<div>
<input type=password class=form-control placeholder=Password name=password id=passwordBox autocomplete='off'>
</div>
<div>
<button type=submit class=submitbutton login btn btn-sm btn-primary id=loginButton name=loginButton>Login</button>
</div>



</form>



POST /nagiosxi/login.php HTTP/1.1


Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 2PQ087253
Vulnerability: Apache HTTP Server Multiple Denial of Service Vulnerabilities
ToDo: These vulnerabilities have been patched in Apache 2.4.9. Refer to Apache httpd 2.4.9 Changelog or your Linux distro for further details.Patch:Following are links for downloading patches to fix the vulnerabilities: Apache 2.4.9Virtual Patches:Trend Micro Virtual PatchingVirtual Patch #1006027: 1006027 - Apache HTTP Server Denial Of Service Vulnerability (CVE-2014-0098)
CertRef:
Tool Reference:
Comment:
ScannerOutput:
QID 87253 detected on port 80 -
Date: Tue, 13 Nov 2018 18:22:44 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>

<div class=parentpage>

<div id=headerQID 87253 detected on port 443 -
Date: Tue, 13 Nov 2018 18:22:45 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>

<div class=parentpage>

<div id=header
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 3PQ087264
Vulnerability: Apache HTTP Server Prior to 2.4.10 Multiple Vulnerabilities
ToDo: These vulnerabilities have been patched in Apache 2.4.10. Refer to Apache httpd 2.4.10 Changelog or your Linux distro for further details.Patch:Following are links for downloading patches to fix the vulnerabilities: Apache 2.4.10: Apache 2.4.xVirtual Patches:Trend Micro Virtual PatchingVirtual Patch #1006158: 1006158 - Apache HTTP Server Remote Denial Of Service Vulnerability (CVE-2014-0117)
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
QID 87264 detected on port 443 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 3PQ087264
Vulnerability: Apache HTTP Server Prior to 2.4.10 Multiple Vulnerabilities
ToDo: These vulnerabilities have been patched in Apache 2.4.10. Refer to Apache httpd 2.4.10 Changelog or your Linux distro for further details.Patch:Following are links for downloading patches to fix the vulnerabilities: Apache 2.4.10: Apache 2.4.xVirtual Patches:Trend Micro Virtual PatchingVirtual Patch #1006158: 1006158 - Apache HTTP Server Remote Denial Of Service Vulnerability (CVE-2014-0117)
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 80/tcp
QID 87264 detected on port 80 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 2PQ087321
Vulnerability: PHP Multiple Vulnerabilities (MS-ISAC ADVISORY NUMBER: 2018-003)
ToDo: Customers are advised to upgrade to the latest version of PHP. Please refer to MS-ISAC ADVISORY-2018-003 for more information about these vulnerabilities.Patch:Following are links for downloading patches to fix the vulnerabilities: Download PHP
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
QID 87321 detected on port 443 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 2PQ087321
Vulnerability: PHP Multiple Vulnerabilities (MS-ISAC ADVISORY NUMBER: 2018-003)
ToDo: Customers are advised to upgrade to the latest version of PHP. Please refer to MS-ISAC ADVISORY-2018-003 for more information about these vulnerabilities.Patch:Following are links for downloading patches to fix the vulnerabilities: Download PHP
CertRef:
Tool Reference: Comment:
ScannerOutput:
Port: 80/tcp
QID 87321 detected on port 80 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 3PQ087329
Vulnerability: Apache HTTP Server Prior to 2.4.30 Multiple Vulnerabilities
ToDo: These vulnerabilities have been patched in Apache. Refer to Apache httpd 2.4.30 Changelog or your Linux distro for further details.Patch:Following are links for downloading patches to fix the vulnerabilities: Apache 2.4.30: Apache 2.4.x
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
QID 87329 detected on port 443 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 3PQ087329
Vulnerability: Apache HTTP Server Prior to 2.4.30 Multiple Vulnerabilities
ToDo: These vulnerabilities have been patched in Apache. Refer to Apache httpd 2.4.30 Changelog or your Linux distro for further details.Patch:Following are links for downloading patches to fix the vulnerabilities: Apache 2.4.30: Apache 2.4.x
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 80/tcp
QID 87329 detected on port 80 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 2PQ087334
Vulnerability: PHP Multiple Vulnerabilities (MS-ISAC : 2018-046)
ToDo: Customers are advised to upgrade to the latest version of PHP. Please refer to MS-ISAC ADVISORY-2018-046 for more information about these vulnerabilities.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
QID 87334 detected on port 443 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 2PQ087334
Vulnerability: PHP Multiple Vulnerabilities (MS-ISAC : 2018-046)
ToDo: Customers are advised to upgrade to the latest version of PHP. Please refer to MS-ISAC ADVISORY-2018-046 for more information about these vulnerabilities.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 80/tcp
QID 87334 detected on port 80 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 3PQ089009
Vulnerability: Apache HTTP Server mod_mime Buffer Overread
ToDo: These vulnerabilities have been patched in Apache. Refer to Apache httpd 2.4.27 Changelog, Apache httpd 2.2.34 Changelog, or your Linux distro for further details.Patch:Following are links for downloading patches to fix the vulnerabilities: CVE-2017-7679: Apache 2.2.x CVE-2017-7679: Apache 2.4.x
CertRef:
Tool Reference: Comment:
ScannerOutput:
QID: 89009 detected on port 80 over TCP -
Date: Tue, 13 Nov 2018 18:22:44 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>

<div class=parentpage>

<div id=headerQID: 89009 detected on port 443 over TCP -
Date: Tue, 13 Nov 2018 18:22:45 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>

<div class=parentpage>

<div id=header
----------------------------------------

Date: 2018-11-13 18:21:27
Vuln#: 3PQ105664
Vulnerability: EOL/Obsolete Software: PHP 5.4.x Detected
ToDo: Upgrade to 5.5 or later. For more information, please refer to the PHP 5.4 to PHP 5.5 Migration Guide.
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
QID: 105664 detected on port 443 over TCP - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------

Re: Nagios XI 5.5.6 many vulnerabilitys found from security

Posted: Wed Nov 14, 2018 10:34 am
by bolson
Hello Nuggel1234,

We here at Nagios Enterprises don't choose which versions of packages such as PHP or Apache to install. Those decisions are made by the operating system vendor. Ie; RHEL or CentOS. To mitigate security vulnerabilities while avoiding backward compatibility issues, RHEL, and by extension CentOS uses a process known as backporting. Here's how it works: RHEL patches the supported versions of these packages with the security fixes from the newer versions of these packages. For example, they will take the code from say PHP 7.2 and apply the security vulnerability fixes from that version to the shipped version, in the case of RHEL 7, PHP 5.4.16. I've included a link to RedHat's website which describes this process. A security audit that checks only the version numbers of installed packages does not take this process into account. So in summary, it's not a question of which versions of packages are supported by Nagios. But rather, which versions are supported by the operating system vendor. Please share this information with your security team and let us know if you have any additional questions.

Thank you for visiting the Nagios Support Forum!

https://access.redhat.com/security/updates/backporting

Re: Nagios XI 5.5.6 many vulnerabilitys found from security

Posted: Wed Nov 21, 2018 1:44 am
by Nuggel1234
OK Thank you.
We have this vulnerability:

• Relating the vulnerability 2PQ038657 (Birthday attacks against TLS ciphers with 64bit block size vulnerability (Sweet32)):

o An nmap scan was also conducted to enumerate the SSL ciphers used by the server and the vulnerability was detected (3DES ciphers):

Our Security says, that we have to implement these settings... is that possible with nagios? And when yes, where do I have to insert the commands?

1. Disable the weak protocols SSL 2.0and SSL 3.0.
2. Enable the strong protocols TLS 1.0, TLS 1.1, and TLS 1.2.
3. Disable the weak cipher encoding algorithms DES, NULL, RC2, RC4, and 3DES.
4. Enable the strong cipher encoding algorithm AES.
5. Disable the weak MAC digest algorithm MD5.
6. Disable the weak anonymous ciphers ADHand AECDH.
7. Disable all export ciphers EXP.
8. Enable the feature to use the server’s cipher preference order.

The ciphers accepted for TLS connections are set with the directive SSLCipherSuite.
The certificates provided by Siemens Server RA are VeriSign’s "Server-gated Crypto"-
certificates, which ensure that even export-restricted web browsers can work with 128
bit-encryption. Siemens CERT recommends to add the following lines to the TLS-part of
the Apache configuration:

SSLProtocol -ALL +TLSv1 +TLSv1.1 +TLSv1.2
SSLHonorCipherOrder On
SSLCipherSuite AES256+EECDH:AES256+EDH:AES128+EECDH:AES128+
EDH:!DES:!NULL:!RC2:!RC4:!3DES:!MD5:!ADH:!AECDH:!EXP

<Location />
SSLRequire %{SSL_CIPHER_USEKEYSIZE} >= 128
</Location>

Note: The alias -ALLused in the SSLProtocoldirective ensures that the SSLv2and
SSLv3protocol will be disabled.
Note: The above shown configuration is very restrictive. As cryptography is an issue in
various countries, one might have to modify these lines! If you have to do this, be as
restrictive as possible!
Cipher-negotiation issues: Because of some known bugs in older versions of Mi-
crosoft’s Internet Explorer we highly recommend to add the following lines to
httpd.conf:
# IE version 7 and following
SetEnvIf User-Agent ".*MSIE ([7-9]|[0-9]{2})\..*" \
ssl-unclean-shutdown

# Older IE versions 1 - 6
SetEnvIf User-Agent ".*MSIE ([1-6])\..*" \
nokeepalive ssl-unclean-shutdown \
downgrade-1.0 force-response-1.0

Re: Nagios XI 5.5.6 many vulnerabilitys found from security

Posted: Wed Nov 21, 2018 10:19 am
by lmiltchev
You can change the available ciphers in apache (ssl.conf). We do not edit the apache defaults, and this is out of scope of Nagios support. Thank you!

Re: Nagios XI 5.5.6 many vulnerabilitys found from security

Posted: Mon Nov 26, 2018 4:19 am
by Nuggel1234
Hello again,

we now have two vulnerabilitys left:

we have to set this in the ssl.conf:

SSLCipherSuite AES256+EECDH:AES256+EDH:AES128+EECDH:AES128+
EDH:!DES:!NULL:!RC2:!RC4:!3DES:!MD5:!ADH:!AECDH:!EXP

But if I set this, I can't reach our server. I'm not a apache / Linux professional... :(


Date: 2018-11-26 08:56:11
Vuln#: 2PQ038657
Vulnerability: Birthday attacks against TLS ciphers with 64bit block size vulnerability (Sweet32)
ToDo: Disable and stop using DES, 3DES, IDEA or RC2 ciphers.
CertRef:
Tool Reference: https://ipinsplus.siemens.com/pub/QIDsearch?id=038657
Comment:
ScannerOutput:
Port: 443/tcp
CIPHER KEY-EXCHANGE AUTHENTICATION MAC ENCRYPTION(KEY-STRENGTH) GRADE
TLSv1 WITH 64-BIT CBC CIPHERS IS SUPPORTED
DES-CBC3-SHA RSA RSA SHA1 3DES(168) MEDIUM EDH-RSA-DES-CBC3-SHA DH RSA SHA1 3DES(168) MEDIUM ECDHE-RSA-DES-CBC3-SHA ECDH RSA SHA1 3DES(168) MEDIUM
TLSv1.1 WITH 64-BIT CBC CIPHERS IS SUPPORTED
DES-CBC3-SHA RSA RSA SHA1 3DES(168) MEDIUM EDH-RSA-DES-CBC3-SHA DH RSA SHA1 3DES(168) MEDIUM ECDHE-RSA-DES-CBC3-SHA ECDH RSA SHA1 3DES(168) MEDIUM
TLSv1.2 WITH 64-BIT CBC CIPHERS IS SUPPORTED
DES-CBC3-SHA RSA RSA SHA1 3DES(168) MEDIUM EDH-RSA-DES-CBC3-SHA DH RSA SHA1 3DES(168) MEDIUM ECDHE-RSA-DES-CBC3-SHA ECDH RSA SHA1 3DES(168) MEDIUM


The second vulnerability is this:

How can we fix this? We are not able to implement ldap or ad- integration.

Thank you


Date: 2018-11-26 08:56:11
Vuln#: 2PQ086728
Vulnerability: Web Server Uses Plain-Text Form Based Authentication
ToDo: Please contact the vendor of the hardware/software for a possible fix for the issue. For custom applications, ensure that data sent via HTML login forms is encrypted before being sent from the client to the host.
CertRef:
Tool Reference: https://ipinsplus.siemens.com/pub/QIDsearch?id=086728
Comment:
ScannerOutput:
Port: 80/tcp
GET /nagiosxi/login.php HTTP/1.1
Host: 141.73.50.34
Connection: Keep-Alive

<form id=loginForm method=post action=/nagiosxi/login.php autocomplete='off'> <input type=hidden name=nsp value=18becbedda65bda3bb007190db7b83f47756ea87dbc0affa9b332387eae6cfec>
<input type=hidden name=page value=auth> <input type=hidden name=debug value=> <input type=hidden name=pageopt value=login>



Login


<div style=margin-bottom: 10px;>
<input type=text class=form-control placeholder=Username value= name=username id=usernameBox autocomplete='off'> </div> <div> <input type=password class=form-control placeholder=Password name=password id=passwordBox autocomplete='off'> </div> <div> <button type=submit class=submitbutton login btn btn-sm btn-primary id=loginButton name=loginButton>Login</button> </div>

Re: Nagios XI 5.5.6 many vulnerabilitys found from security

Posted: Mon Nov 26, 2018 10:36 am
by jomann
For the first one, I would recommend using https://mozilla.github.io/server-side-t ... generator/ to generate the proper modern Apache ciphers list. Yours seems awfully restrictive but I am not 100% certain what you need in your environment.

As for the second one, you are not forcing SSL by redirecting non-https to https. You can do this by doing something like we mention in the very last page of this document: https://assets.nagios.com/downloads/nag ... s%20XI.pdf