Nagios XI 5.5.6 many vulnerabilitys found from security scan
Posted: Wed Nov 14, 2018 1:45 am
Hello,
we use nagios in a bigger company and get scanned our systems by a security department. We installed the newest update yesterday and unfortunality the scanner finds this vulernabilities, which need to be closed as soon as possbile.
Is there a way to fix them or when will there a update to fix them?
Thanks!
Date: 2018-11-13 18:21:27
Vuln#: 3PQ010005
Vulnerability: PHP Prior to 5.6.8/5.5.24/5.4.40 Multiple Remote Code Execution Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the PHP. For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Reference: h
Comment:
ScannerOutput:
Port: 443/tcp
PHP Multiple Remote Code Execution Vulnerabilities detected on port 443 over TCP.
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ010903
Vulnerability: PHP Versions Prior to 5.6.10/5.5.26/5.4.42 Multiple Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the PHP. For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.6.10, PHP 5.5.26, PHP 5.4.42 (PHP)
CertRef:
Tool Reference: Comment:
ScannerOutput:
Port: 443/tcp
PHP Versions Prior to 5.6.10/5.5.26/5.4.42 having Multiple Vulnerabilities detected on port 443 over TCP.
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ010903
Vulnerability: PHP Versions Prior to 5.6.10/5.5.26/5.4.42 Multiple Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the PHP. For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.6.10, PHP 5.5.26, PHP 5.4.42 (PHP)
CertRef:
Tool Reference: Comment:
ScannerOutput:
Port: 80/tcp
PHP Versions Prior to 5.6.10/5.5.26/5.4.42 having Multiple Vulnerabilities detected on port 80 over TCP.
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ011495
Vulnerability: PHP Versions Prior to 5.6.11/5.5.27/5.4.43 mysqlnd BACKRONYM Vulnerability
ToDo: Users are advised to upgrade to the latest version of the software.For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.6.11, PHP 5.5.27, PHP 5.4.43 (PHP)
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
PHP Versions Prior to 5.6.11/5.5.27/5.4.43 mysqlnd BACKRONYM Vulnerability detected on port 443 over TCP.
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ011628
Vulnerability: PHP Versions Prior to 5.6.13/5.5.29/5.4.45 Multiple Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the software.For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP Versions 5.6.13/5.5.29/5.4.45 (PHP)
CertRef:
Comment:
ScannerOutput:
Port: 443/tcp
PHP Versions Prior to 5.6.13/5.5.29/5.4.45 Multiple Vulnerabilities detected on port 443 over TCP.
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ011628
Vulnerability: PHP Versions Prior to 5.6.13/5.5.29/5.4.45 Multiple Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the software.For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP Versions 5.6.13/5.5.29/5.4.45 (PHP)
CertRef:
Tool Reference: Comment:
ScannerOutput:
Port: 80/tcp
PHP Versions Prior to 5.6.13/5.5.29/5.4.45 Multiple Vulnerabilities detected on port 80 over TCP.
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ011629
Vulnerability: PHP Versions Prior to 5.6.12/5.5.28/5.4.44 Multiple Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the software.For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.5.28/5.6.12/5.4.44 (php)
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
PHP Versions Prior to 5.6.12/5.5.28/5.4.44 Multiple Vulnerabilities detected on port 443 over TCP.
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ011629
Vulnerability: PHP Versions Prior to 5.6.12/5.5.28/5.4.44 Multiple Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the software.For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.5.28/5.6.12/5.4.44 (php)
CertRef:
Tool Refere
Comment:
ScannerOutput:
Port: 80/tcp
PHP Versions Prior to 5.6.12/5.5.28/5.4.44 Multiple Vulnerabilities detected on port 80 over TCP.
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ011630
Vulnerability: PHP Versions Prior to 5.6.7/5.5.23/5.4.39 Multiple Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the software. For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP Versions 5.6.7/5.5.23/5.4.39 (php)
CertRef:
Tool Reference: h
Comment:
ScannerOutput:
Port: 443/tcp
PHP Versions Prior to 5.6.7/5.5.23/5.4.39 Multiple Vulnerabilities detected on port 443 over TCP.
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ011630
Vulnerability: PHP Versions Prior to 5.6.7/5.5.23/5.4.39 Multiple Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the software. For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP Versions 5.6.7/5.5.23/5.4.39 (php)
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 80/tcp
PHP Versions Prior to 5.6.7/5.5.23/5.4.39 Multiple Vulnerabilities detected on port 80 over TCP.
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ011631
Vulnerability: PHP Versions Prior to 5.6.2/5.5.18/5.4.34 Multiple Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the software. For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.6.2/5.5.18/5.4.34 (php)
CertRef:
Tool Refe
Comment:
ScannerOutput:
Port: 443/tcp
PHP Versions Prior to 5.6.2/5.5.18/5.4.34 Multiple Vulnerabilities detected on port 443 over TCP.
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ011631
Vulnerability: PHP Versions Prior to 5.6.2/5.5.18/5.4.34 Multiple Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the software. For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.6.2/5.5.18/5.4.34 (php)
CertRef:
Tool Reference: Comment:
ScannerOutput:
Port: 80/tcp
PHP Versions Prior to 5.6.2/5.5.18/5.4.34 Multiple Vulnerabilities detected on port 80 over TCP.
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ011680
Vulnerability: PHP Stack-Based Buffer Overflow Multiple Vunerabilities
ToDo: PHP has released versions 5.6.24 and 7.0.9 to address these bugs as well as other vulnerabilities. Refer to PHP project main page at http://www.php.net/downloads.php to address this issue and obtain more information.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP ChangeLog 5.X: PHP 5.x PHP ChangeLog 7.X: PHP 7.x
CertRef:
Tool Reference
Comment:
ScannerOutput:
Port: 443/tcp
PHP Versions prior to 5.5.38, 5.6.24 or 7.0.9 detected on port 443 over TCP.
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ011680
Vulnerability: PHP Stack-Based Buffer Overflow Multiple Vunerabilities
ToDo: PHP has released versions 5.6.24 and 7.0.9 to address these bugs as well as other vulnerabilities. Refer to PHP project main page at http://www.php.net/downloads.php to address this issue and obtain more information.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP ChangeLog 5.X: PHP 5.x PHP ChangeLog 7.X: PHP 7.x
CertRef:
Tool ReferenceComment:
ScannerOutput:
Port: 80/tcp
PHP Versions prior to 5.5.38, 5.6.24 or 7.0.9 detected on port 80 over TCP.
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ012680
Vulnerability: HTTP TRACE / TRACK Methods Enabled
ToDo: Disable these methods in your web server's configuration file.
CertRef:
Tool Refer
Comment:
ScannerOutput:
Port: 443/tcp
TRACE /QUALYS12680.html HTTP/1.1
Host:
HTTP/1.1 200 OK
Date: Tue, 13 Nov 2018 18:23:31 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
Keep-Alive: timeout=5, max=96
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: message/http
TRACE /QUALYS12680.html HTTP/1.1
Host:
Connection: Keep-Alive
Qualys-Scan: VM
-CR-
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ012680
Vulnerability: HTTP TRACE / TRACK Methods Enabled
ToDo: Disable these methods in your web server's configuration file.
CertRef:
Tool Refere
Comment:
ScannerOutput:
Port: 80/tcp
TRACE /QUALYS12680.html HTTP/1.1
Host:
HTTP/1.1 200 OK
Date: Tue, 13 Nov 2018 18:23:58 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
Keep-Alive: timeout=5, max=96
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: message/http
TRACE /QUALYS12680.html HTTP/1.1
Host:
Connection: Keep-Alive
Qualys-Scan: VM
-CR-
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ012719
Vulnerability: PHP SSL Module NULL Byte Handling Vulnerability
ToDo: Upgrade to PHP 5.4.18 or PHP 5.5.2. Patch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.4.18 (PHP) PHP 5.5.2 (PHP)Virtual Patches:Trend Micro Virtual PatchingVirtual Patch #1005671: 1005671 - PHP SSL Module subjectAltNames NULL Byte Handling Security Vulnerability
CertRef:
Tool Referenc
Comment:
ScannerOutput:
Port: 443/tcp
Date: Tue, 13 Nov 2018 18:22:45 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ012722
Vulnerability: PHP Session Fixation Vulnerability
ToDo: Upgrade to PHP version 5.5.2 or above. For more details about PHP releases and patches please visit PHP Homepage. Additionally, customers may want to follow the following guidelines that would prevent such session fixation vulnerabilities:- Implement the session.use_strict_mod php.ini directive which when enabled, discards uninitialized session IDs.- Implement the session.safe_session_cookie directive that deletes possible malicious cookies, effectively preventing crafted session IDs.- Implement the session.use_trans_sid directive that prevents PHP applications from exposing the session identifier in a URL.- Implement the session.use_only_cookies php.ini directive that directs PHP to never use URLs with session identifiers.However, customers are advised to test their applications after applying these guidelines as they may affect application behaviour in certain cases.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.5.2
CertRef:
Tool Reference
Comment:
ScannerOutput:
Port: 443/tcp
Date: Tue, 13 Nov 2018 18:22:45 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ012722
Vulnerability: PHP Session Fixation Vulnerability
ToDo: Upgrade to PHP version 5.5.2 or above. For more details about PHP releases and patches please visit PHP Homepage. Additionally, customers may want to follow the following guidelines that would prevent such session fixation vulnerabilities:- Implement the session.use_strict_mod php.ini directive which when enabled, discards uninitialized session IDs.- Implement the session.safe_session_cookie directive that deletes possible malicious cookies, effectively preventing crafted session IDs.- Implement the session.use_trans_sid directive that prevents PHP applications from exposing the session identifier in a URL.- Implement the session.use_only_cookies php.ini directive that directs PHP to never use URLs with session identifiers.However, customers are advised to test their applications after applying these guidelines as they may affect application behaviour in certain cases.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.5.2
CertRef:
T
Comment:
ScannerOutput:
Port: 80/tcp
Date: Tue, 13 Nov 2018 18:22:44 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ012798
Vulnerability: PHP OpenSSL Extension Remote Memory Corruption Vulnerability
ToDo: Vendor has released fixed versions PHP 5.3.28, PHP 5.4.23 and PHP 5.5.7. For more details please refer to PHP Home.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.4.23 PHP 5.3.28 PHP 5.5.7
CertRef:
Tool RefeComment:
ScannerOutput:
Port: 443/tcp
Date: Tue, 13 Nov 2018 18:22:45 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ012798
Vulnerability: PHP OpenSSL Extension Remote Memory Corruption Vulnerability
ToDo: Vendor has released fixed versions PHP 5.3.28, PHP 5.4.23 and PHP 5.5.7. For more details please refer to PHP Home.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.4.23 PHP 5.3.28 PHP 5.5.7
CertRef:
Tool Reference
Comment:
ScannerOutput:
Port: 80/tcp
Date: Tue, 13 Nov 2018 18:22:44 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8
<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>
<div class=parentpage>
<div id=header
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ012808
Vulnerability: PHP Denial of Service Vulnerability
ToDo: Users are advised to upgrade to the latest version of PHP available. For more details about PHP releases and patches please visit PHP Homepage.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Reference: htt
Comment:
ScannerOutput:
Port: 443/tcp
Date: Tue, 13 Nov 2018 18:22:45 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8
<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>
<div class=parentpage>
<div id=header
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ012808
Vulnerability: PHP Denial of Service Vulnerability
ToDo: Users are advised to upgrade to the latest version of PHP available. For more details about PHP releases and patches please visit PHP Homepage.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Reference: htt
Comment:
ScannerOutput:
Port: 80/tcp
Date: Tue, 13 Nov 2018 18:22:44 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8
<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>
<div class=parentpage>
<div id=header
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ012868
Vulnerability: PHP Fileinfo libmagic Multiple Denial of Service Vulnerabilities
ToDo: Users are advised to upgrade to the latest version 5.5.10 or 5.4.26. Latest version can be downloaded from herePatch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Reference
Comment:
ScannerOutput:
Port: 443/tcp
Date: Tue, 13 Nov 2018 18:22:45 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8
<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>
<div class=parentpage>
<div id=header
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ012868
Vulnerability: PHP Fileinfo libmagic Multiple Denial of Service Vulnerabilities
ToDo: Users are advised to upgrade to the latest version 5.5.10 or 5.4.26. Latest version can be downloaded from herePatch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Reference: Comment:
ScannerOutput:
Port: 80/tcp
Date: Tue, 13 Nov 2018 18:22:44 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8
<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>
<div class=parentpage>
<div id=header
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ012913
Vulnerability: PHP 5.5.x And 5.4.x Denial Of Service Vulnerability
ToDo: Users are advised to upgrade to the latest version 5.5.11. Latest version can be downloaded from herePatch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.5.11
CertRef:
Tool Refe
Comment:
ScannerOutput:
Port: 443/tcp
Date: Tue, 13 Nov 2018 18:22:45 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8
<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>
<div class=parentpage>
<div id=header
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ012913
Vulnerability: PHP 5.5.x And 5.4.x Denial Of Service Vulnerability
ToDo: Users are advised to upgrade to the latest version 5.5.11. Latest version can be downloaded from herePatch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.5.11
CertRef:
Tool Reference:
ScannerOutput:
Port: 80/tcp
Date: Tue, 13 Nov 2018 18:22:44 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8
<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>
<div class=parentpage>
<div id=header
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ012969
Vulnerability: PHP CDF File Parsing Multiple Denial of Service Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the software available. For more information, please visit:PHP 5.4.29PHP 5.5.13Patch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Refere
Comment:
ScannerOutput:
Port: 443/tcp
Date: Tue, 13 Nov 2018 18:22:45 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8
<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>
<div class=parentpage>
<div id=header
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ012969
Vulnerability: PHP CDF File Parsing Multiple Denial of Service Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the software available. For more information, please visit:PHP 5.4.29PHP 5.5.13Patch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Referenc
Comment:
ScannerOutput:
Port: 80/tcp
Date: Tue, 13 Nov 2018 18:22:44 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8
<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>
<div class=parentpage>
<div id=header
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ013035
Vulnerability: PHP Prior to 5.4.32/5.5.16 Multiple Vulnerabilities
ToDo: Update to version 5.4.32 or 5.5.16. For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.5.16 PHP 5.4.32
CertRef:
Tool Reference: h
Comment:
ScannerOutput:
Port: 443/tcp
Date: Tue, 13 Nov 2018 18:22:45 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8
<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>
<div class=parentpage>
<div id=header
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ013035
Vulnerability: PHP Prior to 5.4.32/5.5.16 Multiple Vulnerabilities
ToDo: Update to version 5.4.32 or 5.5.16. For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.5.16 PHP 5.4.32
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 80/tcp
Date: Tue, 13 Nov 2018 18:22:44 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8
<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>
<div class=parentpage>
<div id=header
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ013083
Vulnerability: PHP unserialize() Use-After-Free Vulnerability
ToDo: Users are advised to upgrade to the latest version of the PHP.For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
QID: 13083 detected on port 443
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ013083
Vulnerability: PHP unserialize() Use-After-Free Vulnerability
ToDo: Users are advised to upgrade to the latest version of the PHP.For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Reference: Comment:
ScannerOutput:
Port: 80/tcp
QID: 13083 detected on port 80
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ013085
Vulnerability: PHP Denial of Service and Code Execution Vulnerability
ToDo: The vendor has confirmed the vulnerability, but no patch is available as of now, however vendor has released fixes for these vulnerabilities via snapshots/ revisions.Workaround:For more information regarding snapshot/revision download please visit PHP
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
QID: 13085 detected on port 443
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ013085
Vulnerability: PHP Denial of Service and Code Execution Vulnerability
ToDo: The vendor has confirmed the vulnerability, but no patch is available as of now, however vendor has released fixes for these vulnerabilities via snapshots/ revisions.Workaround:For more information regarding snapshot/revision download please visit PHP
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 80/tcp
QID: 13085 detected on port 80
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ013098
Vulnerability: PHP Multiple Remote Code Execution Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the PHP.For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Refere
Comment:
ScannerOutput:
Port: 443/tcp
PHP Multiple Remote Code Execution Vulnerabilities detected on port 443 over TCP.
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ013098
Vulnerability: PHP Multiple Remote Code Execution Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the PHP.For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Reference
Comment:
ScannerOutput:
Port: 80/tcp
PHP Multiple Remote Code Execution Vulnerabilities detected on port 80 over TCP.
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ013108
Vulnerability: PHP Multiple Remote Code Execution Vulnerabilities (GHOST)
ToDo: Users are advised to upgrade to the latest version of the PHP. For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Reference
Comment:
ScannerOutput:
Port: 443/tcp
PHP Multiple Remote Code Execution Vulnerabilities detected on port 443 over TCP.
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ013108
Vulnerability: PHP Multiple Remote Code Execution Vulnerabilities (GHOST)
ToDo: Users are advised to upgrade to the latest version of the PHP. For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Reference: /pub/QIDsearch?id=013108
Comment:
ScannerOutput:
Port: 80/tcp
PHP Multiple Remote Code Execution Vulnerabilities detected on port 80 over TCP.
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ038657
Vulnerability: Birthday attacks against TLS ciphers with 64bit block size vulnerability (Sweet32)
ToDo: Disable and stop using DES, 3DES, IDEA or RC2 ciphers.
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
CIPHER KEY-EXCHANGE AUTHENTICATION MAC ENCRYPTION(KEY-STRENGTH) GRADE
TLSv1 WITH 64-BIT CBC CIPHERS IS SUPPORTED
DES-CBC3-SHA RSA RSA SHA1 3DES(168) MEDIUM
EDH-RSA-DES-CBC3-SHA DH RSA SHA1 3DES(168) MEDIUM
ECDHE-RSA-DES-CBC3-SHA ECDH RSA SHA1 3DES(168) MEDIUM
TLSv1.1 WITH 64-BIT CBC CIPHERS IS SUPPORTED
DES-CBC3-SHA RSA RSA SHA1 3DES(168) MEDIUM
EDH-RSA-DES-CBC3-SHA DH RSA SHA1 3DES(168) MEDIUM
ECDHE-RSA-DES-CBC3-SHA ECDH RSA SHA1 3DES(168) MEDIUM
TLSv1.2 WITH 64-BIT CBC CIPHERS IS SUPPORTED
DES-CBC3-SHA RSA RSA SHA1 3DES(168) MEDIUM
EDH-RSA-DES-CBC3-SHA DH RSA SHA1 3DES(168) MEDIUM
ECDHE-RSA-DES-CBC3-SHA ECDH RSA SHA1 3DES(168) MEDIUM
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ086172
Vulnerability: Apache HTTP Server Prior to 2.4.16/2.2.31 Multiple Vulnerabilities
ToDo: These vulnerabilities have been patched in Apache. Refer to Apache httpd 2.4.16 Changelog and Apache httpd 2.2.31 Changelog or your Linux distro for further details.Patch:Following are links for downloading patches to fix the vulnerabilities: Apache 2.4.16/2.2.31: Apache
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
QID 86172 detected on port 443 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ086172
Vulnerability: Apache HTTP Server Prior to 2.4.16/2.2.31 Multiple Vulnerabilities
ToDo: These vulnerabilities have been patched in Apache. Refer to Apache httpd 2.4.16 Changelog and Apache httpd 2.2.31 Changelog or your Linux distro for further details.Patch:Following are links for downloading patches to fix the vulnerabilities: Apache 2.4.16/2.2.31: Apache
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 80/tcp
QID 86172 detected on port 80 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 1PQ086473
Vulnerability: Web Server HTTP Trace/Track Method Support Cross-Site Tracing Vulnerability
ToDo: Solutions for some of the common Web servers are supplied below. For other Web servers, please check your vendor's documentation.Apache: Recent Apache versions have a Rewrite module that allows HTTP requests to be rewritten or handled in a specific way. Compile the Apache server with the mod_rewrite module. You might need to uncomment the 'AddModule' and 'LoadModule' directives in the httpd.conf configuration file. Add the following lines for each virtualhost in your configuration file (Please note that, by default, Rewrite configurations are not inherited. This means that you need to have Rewrite directives for each virtual host in which you wish to use it):< IfModule mod_rewrite.c> RewriteEngine onRewriteCond %{REQUEST_METHOD} ^TRACERewriteRule .* - [F]< /IfModule> With this configuration, Apache catches all TRACE requests, and replies with a page reporting the request as forbidden. None of the original request's contents are echoed back.A slightly tighter fix is to use:<
IfModule mod_rewrite.c> RewriteEngine onRewriteCond %{REQUEST_METHOD} !^(GET|POST|HEAD)$RewriteRule .* - [F]< /IfModule> Please note that RewriteEngine can be processor intensive and may impact the web server performance. The trace method can also be controlled by use of the TraceEnable directive.In the httpd.conf add or modify:TraceEnable OffMicrosoft IIS: Microsoft released URLScan, which can be used to screen all incoming requests based on customized rulesets. URLScan can be used to sanitize or disable the TRACE requests from the clients. Note that IIS aliases 'TRACK' to 'TRACE'. Therefore, if URLScan is used to specfically block the TRACE method, the TRACK method should also be added to the filter.URLScan uses the 'urlscan.ini' configuration file, usually in \\System32\\InetSrv\\URLScan directory. In that, we have two sections - AllowVerbs and DenyVerbs. The former is used if the UseAllowVerbs variable is set to 1, else (if its set to 0), the DenyVerbs are used. Clearly, either
can be used, depending on whether we want a Default-Deny-Explicit-Allow or a Default-Allow-Explicit-Deny policy. To disallow TRACE and TRACK methods through URLScan, first remove 'TRACK', 'TRACE' methods from the 'AllowVerbs' section and add them to the 'DenyVerbs' section. With this, URLScan will disallow all 'TRACE' and 'TRACK' methods, and generate an error page for all requests using that method. To enable the changes, restart the 'World Wide Web Publishing Service' from the 'Services' Control Panel item.For more details about other web servers : Cert Advisory.
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
TRACE / HTTP/1.1
Host:
Via: <script>alert('QualysXSS');</script>
HTTP/1.1 200 OK
Date: Tue, 13 Nov 2018 18:23:29 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
Transfer-Encoding: chunked
Content-Type: message/http
TRACE / HTTP/1.1
Host:
Via: <script>alert('QualysXSS');</script>
Qualys-Scan: VM
-CR-TRACE / HTTP/1.0
Via: <script>alert('QualysXSS');</script>
HTTP/1.1 200 OK
Date: Tue, 13 Nov 2018 18:23:29 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
Connection: close
Content-Type: message/http
TRACE / HTTP/1.0
Via: <script>alert('QualysXSS');</script>
Qualys-Scan: VM
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 1PQ086473
Vulnerability: Web Server HTTP Trace/Track Method Support Cross-Site Tracing Vulnerability
ToDo: Solutions for some of the common Web servers are supplied below. For other Web servers, please check your vendor's documentation.Apache: Recent Apache versions have a Rewrite module that allows HTTP requests to be rewritten or handled in a specific way. Compile the Apache server with the mod_rewrite module. You might need to uncomment the 'AddModule' and 'LoadModule' directives in the httpd.conf configuration file. Add the following lines for each virtualhost in your configuration file (Please note that, by default, Rewrite configurations are not inherited. This means that you need to have Rewrite directives for each virtual host in which you wish to use it):< IfModule mod_rewrite.c> RewriteEngine onRewriteCond %{REQUEST_METHOD} ^TRACERewriteRule .* - [F]< /IfModule> With this configuration, Apache catches all TRACE requests, and replies with a page reporting the request as forbidden. None of the original request's contents are echoed back.A slightly tighter fix is to use:<
IfModule mod_rewrite.c> RewriteEngine onRewriteCond %{REQUEST_METHOD} !^(GET|POST|HEAD)$RewriteRule .* - [F]< /IfModule> Please note that RewriteEngine can be processor intensive and may impact the web server performance. The trace method can also be controlled by use of the TraceEnable directive.In the httpd.conf add or modify:TraceEnable OffMicrosoft IIS: Microsoft released URLScan, which can be used to screen all incoming requests based on customized rulesets. URLScan can be used to sanitize or disable the TRACE requests from the clients. Note that IIS aliases 'TRACK' to 'TRACE'. Therefore, if URLScan is used to specfically block the TRACE method, the TRACK method should also be added to the filter.URLScan uses the 'urlscan.ini' configuration file, usually in \\System32\\InetSrv\\URLScan directory. In that, we have two sections - AllowVerbs and DenyVerbs. The former is used if the UseAllowVerbs variable is set to 1, else (if its set to 0), the DenyVerbs are used. Clearly, either
can be used, depending on whether we want a Default-Deny-Explicit-Allow or a Default-Allow-Explicit-Deny policy. To disallow TRACE and TRACK methods through URLScan, first remove 'TRACK', 'TRACE' methods from the 'AllowVerbs' section and add them to the 'DenyVerbs' section. With this, URLScan will disallow all 'TRACE' and 'TRACK' methods, and generate an error page for all requests using that method. To enable the changes, restart the 'World Wide Web Publishing Service' from the 'Services' Control Panel item.For more details about other web servers : Cert Advisory.
CertRef:
Tool Reference: Comment:
ScannerOutput:
Port: 80/tcp
TRACE / HTTP/1.1
Host:
Via: <script>alert('QualysXSS');</script>
HTTP/1.1 200 OK
Date: Tue, 13 Nov 2018 18:23:55 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
Transfer-Encoding: chunked
Content-Type: message/http
TRACE / HTTP/1.1
Host:
Via: <script>alert('QualysXSS');</script>
Qualys-Scan: VM
-CR-TRACE / HTTP/1.0
Via: <script>alert('QualysXSS');</script>
HTTP/1.1 200 OK
Date: Tue, 13 Nov 2018 18:23:55 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
Connection: close
Content-Type: message/http
TRACE / HTTP/1.0
Via: <script>alert('QualysXSS');</script>
Qualys-Scan: VM
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ086488
Vulnerability: Apache HTTP Server Prior to 2.4.20 Thread Starvation Vulnerability
ToDo: These vulnerability have been patched in Apache 2.4.20. Refer to Apache httpd 2.4.20 Changelog or your Linux distro for further details.Patch:Following are links for downloading patches to fix the vulnerabilities: Apache 2.4.20: Apache 2.4.x
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
QID 86488 detected on port 443 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ086488
Vulnerability: Apache HTTP Server Prior to 2.4.20 Thread Starvation Vulnerability
ToDo: These vulnerability have been patched in Apache 2.4.20. Refer to Apache httpd 2.4.20 Changelog or your Linux distro for further details.Patch:Following are links for downloading patches to fix the vulnerabilities: Apache 2.4.20: Apache 2.4.x
CertRef:
Tool Reference: Comment:
ScannerOutput:
Port: 80/tcp
QID 86488 detected on port 80 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ086489
Vulnerability: Apache HTTP Server Prior to 2.4.12 Multiple Vulnerabilities
ToDo: These vulnerabilities have been patched in Apache 2.4.12. Refer to Apache httpd 2.4.12 Changelog or your Linux distro for further details.Patch:Following are links for downloading patches to fix the vulnerabilities: Apache 2.4.12: Apache 2.4.xVirtual Patches:Trend Micro Virtual PatchingVirtual Patch #1006305: 1006305 - Apache HTTP Server 'mod_cache' Denial Of Service Vulnerability
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
QID 86488 detected on port 443 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ086489
Vulnerability: Apache HTTP Server Prior to 2.4.12 Multiple Vulnerabilities
ToDo: These vulnerabilities have been patched in Apache 2.4.12. Refer to Apache httpd 2.4.12 Changelog or your Linux distro for further details.Patch:Following are links for downloading patches to fix the vulnerabilities: Apache 2.4.12: Apache 2.4.xVirtual Patches:Trend Micro Virtual PatchingVirtual Patch #1006305: 1006305 - Apache HTTP Server 'mod_cache' Denial Of Service Vulnerability
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 80/tcp
QID 86488 detected on port 80 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ086491
Vulnerability: Apache HTTP Server Remote Denial of Service Vulnerability
ToDo: The vulnerability have been patched in Apache 2.4.7. Refer to Apache httpd 2.4.7 Changelog or your Linux distro for further details.Patch:Following are links for downloading patches to fix the vulnerabilities: Apache 2.4.7: Apache 2.4.x
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
QID 86491 detected on port 443 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ086491
Vulnerability: Apache HTTP Server Remote Denial of Service Vulnerability
ToDo: The vulnerability have been patched in Apache 2.4.7. Refer to Apache httpd 2.4.7 Changelog or your Linux distro for further details.Patch:Following are links for downloading patches to fix the vulnerabilities: Apache 2.4.7: Apache 2.4.x
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 80/tcp
QID 86491 detected on port 80 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ086728
Vulnerability: Web Server Uses Plain-Text Form Based Authentication
ToDo: Please contact the vendor of the hardware/software for a possible fix for the issue. For custom applications, ensure that data sent via HTML login forms is encrypted before being sent from the client to the host.
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 80/tcp
GET /nagiosxi/login.php HTTP/1.1
Host
Connection: Keep-Alive
<form id=loginForm method=post action=/nagiosxi/login.php autocomplete='off'>
<input type=hidden name=nsp value=413b290a57c54b9cd1df0620bedff4f806950b6bd5e0bc869d3e8f250d9c3b9c>
<input type=hidden name=page value=auth>
<input type=hidden name=debug value=>
<input type=hidden name=pageopt value=login>
Login
<div style=margin-bottom: 10px;>
<input type=text class=form-control placeholder=Username value= name=username id=usernameBox autocomplete='off'>
</div>
<div>
<input type=password class=form-control placeholder=Password name=password id=passwordBox autocomplete='off'>
</div>
<div>
<button type=submit class=submitbutton login btn btn-sm btn-primary id=loginButton name=loginButton>Login</button>
</div>
</form>
POST /nagiosxi/login.php HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ087253
Vulnerability: Apache HTTP Server Multiple Denial of Service Vulnerabilities
ToDo: These vulnerabilities have been patched in Apache 2.4.9. Refer to Apache httpd 2.4.9 Changelog or your Linux distro for further details.Patch:Following are links for downloading patches to fix the vulnerabilities: Apache 2.4.9Virtual Patches:Trend Micro Virtual PatchingVirtual Patch #1006027: 1006027 - Apache HTTP Server Denial Of Service Vulnerability (CVE-2014-0098)
CertRef:
Tool Reference:
Comment:
ScannerOutput:
QID 87253 detected on port 80 -
Date: Tue, 13 Nov 2018 18:22:44 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8
<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>
<div class=parentpage>
<div id=headerQID 87253 detected on port 443 -
Date: Tue, 13 Nov 2018 18:22:45 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8
<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>
<div class=parentpage>
<div id=header
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ087264
Vulnerability: Apache HTTP Server Prior to 2.4.10 Multiple Vulnerabilities
ToDo: These vulnerabilities have been patched in Apache 2.4.10. Refer to Apache httpd 2.4.10 Changelog or your Linux distro for further details.Patch:Following are links for downloading patches to fix the vulnerabilities: Apache 2.4.10: Apache 2.4.xVirtual Patches:Trend Micro Virtual PatchingVirtual Patch #1006158: 1006158 - Apache HTTP Server Remote Denial Of Service Vulnerability (CVE-2014-0117)
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
QID 87264 detected on port 443 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ087264
Vulnerability: Apache HTTP Server Prior to 2.4.10 Multiple Vulnerabilities
ToDo: These vulnerabilities have been patched in Apache 2.4.10. Refer to Apache httpd 2.4.10 Changelog or your Linux distro for further details.Patch:Following are links for downloading patches to fix the vulnerabilities: Apache 2.4.10: Apache 2.4.xVirtual Patches:Trend Micro Virtual PatchingVirtual Patch #1006158: 1006158 - Apache HTTP Server Remote Denial Of Service Vulnerability (CVE-2014-0117)
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 80/tcp
QID 87264 detected on port 80 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ087321
Vulnerability: PHP Multiple Vulnerabilities (MS-ISAC ADVISORY NUMBER: 2018-003)
ToDo: Customers are advised to upgrade to the latest version of PHP. Please refer to MS-ISAC ADVISORY-2018-003 for more information about these vulnerabilities.Patch:Following are links for downloading patches to fix the vulnerabilities: Download PHP
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
QID 87321 detected on port 443 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ087321
Vulnerability: PHP Multiple Vulnerabilities (MS-ISAC ADVISORY NUMBER: 2018-003)
ToDo: Customers are advised to upgrade to the latest version of PHP. Please refer to MS-ISAC ADVISORY-2018-003 for more information about these vulnerabilities.Patch:Following are links for downloading patches to fix the vulnerabilities: Download PHP
CertRef:
Tool Reference: Comment:
ScannerOutput:
Port: 80/tcp
QID 87321 detected on port 80 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ087329
Vulnerability: Apache HTTP Server Prior to 2.4.30 Multiple Vulnerabilities
ToDo: These vulnerabilities have been patched in Apache. Refer to Apache httpd 2.4.30 Changelog or your Linux distro for further details.Patch:Following are links for downloading patches to fix the vulnerabilities: Apache 2.4.30: Apache 2.4.x
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
QID 87329 detected on port 443 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ087329
Vulnerability: Apache HTTP Server Prior to 2.4.30 Multiple Vulnerabilities
ToDo: These vulnerabilities have been patched in Apache. Refer to Apache httpd 2.4.30 Changelog or your Linux distro for further details.Patch:Following are links for downloading patches to fix the vulnerabilities: Apache 2.4.30: Apache 2.4.x
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 80/tcp
QID 87329 detected on port 80 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ087334
Vulnerability: PHP Multiple Vulnerabilities (MS-ISAC : 2018-046)
ToDo: Customers are advised to upgrade to the latest version of PHP. Please refer to MS-ISAC ADVISORY-2018-046 for more information about these vulnerabilities.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
QID 87334 detected on port 443 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ087334
Vulnerability: PHP Multiple Vulnerabilities (MS-ISAC : 2018-046)
ToDo: Customers are advised to upgrade to the latest version of PHP. Please refer to MS-ISAC ADVISORY-2018-046 for more information about these vulnerabilities.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 80/tcp
QID 87334 detected on port 80 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ089009
Vulnerability: Apache HTTP Server mod_mime Buffer Overread
ToDo: These vulnerabilities have been patched in Apache. Refer to Apache httpd 2.4.27 Changelog, Apache httpd 2.2.34 Changelog, or your Linux distro for further details.Patch:Following are links for downloading patches to fix the vulnerabilities: CVE-2017-7679: Apache 2.2.x CVE-2017-7679: Apache 2.4.x
CertRef:
Tool Reference: Comment:
ScannerOutput:
QID: 89009 detected on port 80 over TCP -
Date: Tue, 13 Nov 2018 18:22:44 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8
<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>
<div class=parentpage>
<div id=headerQID: 89009 detected on port 443 over TCP -
Date: Tue, 13 Nov 2018 18:22:45 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8
<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>
<div class=parentpage>
<div id=header
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ105664
Vulnerability: EOL/Obsolete Software: PHP 5.4.x Detected
ToDo: Upgrade to 5.5 or later. For more information, please refer to the PHP 5.4 to PHP 5.5 Migration Guide.
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
QID: 105664 detected on port 443 over TCP - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------
we use nagios in a bigger company and get scanned our systems by a security department. We installed the newest update yesterday and unfortunality the scanner finds this vulernabilities, which need to be closed as soon as possbile.
Is there a way to fix them or when will there a update to fix them?
Thanks!
Date: 2018-11-13 18:21:27
Vuln#: 3PQ010005
Vulnerability: PHP Prior to 5.6.8/5.5.24/5.4.40 Multiple Remote Code Execution Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the PHP. For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Reference: h
Comment:
ScannerOutput:
Port: 443/tcp
PHP Multiple Remote Code Execution Vulnerabilities detected on port 443 over TCP.
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ010903
Vulnerability: PHP Versions Prior to 5.6.10/5.5.26/5.4.42 Multiple Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the PHP. For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.6.10, PHP 5.5.26, PHP 5.4.42 (PHP)
CertRef:
Tool Reference: Comment:
ScannerOutput:
Port: 443/tcp
PHP Versions Prior to 5.6.10/5.5.26/5.4.42 having Multiple Vulnerabilities detected on port 443 over TCP.
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ010903
Vulnerability: PHP Versions Prior to 5.6.10/5.5.26/5.4.42 Multiple Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the PHP. For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.6.10, PHP 5.5.26, PHP 5.4.42 (PHP)
CertRef:
Tool Reference: Comment:
ScannerOutput:
Port: 80/tcp
PHP Versions Prior to 5.6.10/5.5.26/5.4.42 having Multiple Vulnerabilities detected on port 80 over TCP.
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ011495
Vulnerability: PHP Versions Prior to 5.6.11/5.5.27/5.4.43 mysqlnd BACKRONYM Vulnerability
ToDo: Users are advised to upgrade to the latest version of the software.For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.6.11, PHP 5.5.27, PHP 5.4.43 (PHP)
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
PHP Versions Prior to 5.6.11/5.5.27/5.4.43 mysqlnd BACKRONYM Vulnerability detected on port 443 over TCP.
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ011628
Vulnerability: PHP Versions Prior to 5.6.13/5.5.29/5.4.45 Multiple Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the software.For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP Versions 5.6.13/5.5.29/5.4.45 (PHP)
CertRef:
Comment:
ScannerOutput:
Port: 443/tcp
PHP Versions Prior to 5.6.13/5.5.29/5.4.45 Multiple Vulnerabilities detected on port 443 over TCP.
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ011628
Vulnerability: PHP Versions Prior to 5.6.13/5.5.29/5.4.45 Multiple Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the software.For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP Versions 5.6.13/5.5.29/5.4.45 (PHP)
CertRef:
Tool Reference: Comment:
ScannerOutput:
Port: 80/tcp
PHP Versions Prior to 5.6.13/5.5.29/5.4.45 Multiple Vulnerabilities detected on port 80 over TCP.
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ011629
Vulnerability: PHP Versions Prior to 5.6.12/5.5.28/5.4.44 Multiple Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the software.For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.5.28/5.6.12/5.4.44 (php)
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
PHP Versions Prior to 5.6.12/5.5.28/5.4.44 Multiple Vulnerabilities detected on port 443 over TCP.
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ011629
Vulnerability: PHP Versions Prior to 5.6.12/5.5.28/5.4.44 Multiple Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the software.For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.5.28/5.6.12/5.4.44 (php)
CertRef:
Tool Refere
Comment:
ScannerOutput:
Port: 80/tcp
PHP Versions Prior to 5.6.12/5.5.28/5.4.44 Multiple Vulnerabilities detected on port 80 over TCP.
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ011630
Vulnerability: PHP Versions Prior to 5.6.7/5.5.23/5.4.39 Multiple Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the software. For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP Versions 5.6.7/5.5.23/5.4.39 (php)
CertRef:
Tool Reference: h
Comment:
ScannerOutput:
Port: 443/tcp
PHP Versions Prior to 5.6.7/5.5.23/5.4.39 Multiple Vulnerabilities detected on port 443 over TCP.
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ011630
Vulnerability: PHP Versions Prior to 5.6.7/5.5.23/5.4.39 Multiple Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the software. For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP Versions 5.6.7/5.5.23/5.4.39 (php)
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 80/tcp
PHP Versions Prior to 5.6.7/5.5.23/5.4.39 Multiple Vulnerabilities detected on port 80 over TCP.
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ011631
Vulnerability: PHP Versions Prior to 5.6.2/5.5.18/5.4.34 Multiple Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the software. For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.6.2/5.5.18/5.4.34 (php)
CertRef:
Tool Refe
Comment:
ScannerOutput:
Port: 443/tcp
PHP Versions Prior to 5.6.2/5.5.18/5.4.34 Multiple Vulnerabilities detected on port 443 over TCP.
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ011631
Vulnerability: PHP Versions Prior to 5.6.2/5.5.18/5.4.34 Multiple Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the software. For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.6.2/5.5.18/5.4.34 (php)
CertRef:
Tool Reference: Comment:
ScannerOutput:
Port: 80/tcp
PHP Versions Prior to 5.6.2/5.5.18/5.4.34 Multiple Vulnerabilities detected on port 80 over TCP.
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ011680
Vulnerability: PHP Stack-Based Buffer Overflow Multiple Vunerabilities
ToDo: PHP has released versions 5.6.24 and 7.0.9 to address these bugs as well as other vulnerabilities. Refer to PHP project main page at http://www.php.net/downloads.php to address this issue and obtain more information.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP ChangeLog 5.X: PHP 5.x PHP ChangeLog 7.X: PHP 7.x
CertRef:
Tool Reference
Comment:
ScannerOutput:
Port: 443/tcp
PHP Versions prior to 5.5.38, 5.6.24 or 7.0.9 detected on port 443 over TCP.
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ011680
Vulnerability: PHP Stack-Based Buffer Overflow Multiple Vunerabilities
ToDo: PHP has released versions 5.6.24 and 7.0.9 to address these bugs as well as other vulnerabilities. Refer to PHP project main page at http://www.php.net/downloads.php to address this issue and obtain more information.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP ChangeLog 5.X: PHP 5.x PHP ChangeLog 7.X: PHP 7.x
CertRef:
Tool ReferenceComment:
ScannerOutput:
Port: 80/tcp
PHP Versions prior to 5.5.38, 5.6.24 or 7.0.9 detected on port 80 over TCP.
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ012680
Vulnerability: HTTP TRACE / TRACK Methods Enabled
ToDo: Disable these methods in your web server's configuration file.
CertRef:
Tool Refer
Comment:
ScannerOutput:
Port: 443/tcp
TRACE /QUALYS12680.html HTTP/1.1
Host:
HTTP/1.1 200 OK
Date: Tue, 13 Nov 2018 18:23:31 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
Keep-Alive: timeout=5, max=96
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: message/http
TRACE /QUALYS12680.html HTTP/1.1
Host:
Connection: Keep-Alive
Qualys-Scan: VM
-CR-
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ012680
Vulnerability: HTTP TRACE / TRACK Methods Enabled
ToDo: Disable these methods in your web server's configuration file.
CertRef:
Tool Refere
Comment:
ScannerOutput:
Port: 80/tcp
TRACE /QUALYS12680.html HTTP/1.1
Host:
HTTP/1.1 200 OK
Date: Tue, 13 Nov 2018 18:23:58 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
Keep-Alive: timeout=5, max=96
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: message/http
TRACE /QUALYS12680.html HTTP/1.1
Host:
Connection: Keep-Alive
Qualys-Scan: VM
-CR-
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ012719
Vulnerability: PHP SSL Module NULL Byte Handling Vulnerability
ToDo: Upgrade to PHP 5.4.18 or PHP 5.5.2. Patch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.4.18 (PHP) PHP 5.5.2 (PHP)Virtual Patches:Trend Micro Virtual PatchingVirtual Patch #1005671: 1005671 - PHP SSL Module subjectAltNames NULL Byte Handling Security Vulnerability
CertRef:
Tool Referenc
Comment:
ScannerOutput:
Port: 443/tcp
Date: Tue, 13 Nov 2018 18:22:45 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ012722
Vulnerability: PHP Session Fixation Vulnerability
ToDo: Upgrade to PHP version 5.5.2 or above. For more details about PHP releases and patches please visit PHP Homepage. Additionally, customers may want to follow the following guidelines that would prevent such session fixation vulnerabilities:- Implement the session.use_strict_mod php.ini directive which when enabled, discards uninitialized session IDs.- Implement the session.safe_session_cookie directive that deletes possible malicious cookies, effectively preventing crafted session IDs.- Implement the session.use_trans_sid directive that prevents PHP applications from exposing the session identifier in a URL.- Implement the session.use_only_cookies php.ini directive that directs PHP to never use URLs with session identifiers.However, customers are advised to test their applications after applying these guidelines as they may affect application behaviour in certain cases.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.5.2
CertRef:
Tool Reference
Comment:
ScannerOutput:
Port: 443/tcp
Date: Tue, 13 Nov 2018 18:22:45 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ012722
Vulnerability: PHP Session Fixation Vulnerability
ToDo: Upgrade to PHP version 5.5.2 or above. For more details about PHP releases and patches please visit PHP Homepage. Additionally, customers may want to follow the following guidelines that would prevent such session fixation vulnerabilities:- Implement the session.use_strict_mod php.ini directive which when enabled, discards uninitialized session IDs.- Implement the session.safe_session_cookie directive that deletes possible malicious cookies, effectively preventing crafted session IDs.- Implement the session.use_trans_sid directive that prevents PHP applications from exposing the session identifier in a URL.- Implement the session.use_only_cookies php.ini directive that directs PHP to never use URLs with session identifiers.However, customers are advised to test their applications after applying these guidelines as they may affect application behaviour in certain cases.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.5.2
CertRef:
T
Comment:
ScannerOutput:
Port: 80/tcp
Date: Tue, 13 Nov 2018 18:22:44 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ012798
Vulnerability: PHP OpenSSL Extension Remote Memory Corruption Vulnerability
ToDo: Vendor has released fixed versions PHP 5.3.28, PHP 5.4.23 and PHP 5.5.7. For more details please refer to PHP Home.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.4.23 PHP 5.3.28 PHP 5.5.7
CertRef:
Tool RefeComment:
ScannerOutput:
Port: 443/tcp
Date: Tue, 13 Nov 2018 18:22:45 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ012798
Vulnerability: PHP OpenSSL Extension Remote Memory Corruption Vulnerability
ToDo: Vendor has released fixed versions PHP 5.3.28, PHP 5.4.23 and PHP 5.5.7. For more details please refer to PHP Home.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.4.23 PHP 5.3.28 PHP 5.5.7
CertRef:
Tool Reference
Comment:
ScannerOutput:
Port: 80/tcp
Date: Tue, 13 Nov 2018 18:22:44 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8
<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>
<div class=parentpage>
<div id=header
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ012808
Vulnerability: PHP Denial of Service Vulnerability
ToDo: Users are advised to upgrade to the latest version of PHP available. For more details about PHP releases and patches please visit PHP Homepage.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Reference: htt
Comment:
ScannerOutput:
Port: 443/tcp
Date: Tue, 13 Nov 2018 18:22:45 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8
<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>
<div class=parentpage>
<div id=header
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ012808
Vulnerability: PHP Denial of Service Vulnerability
ToDo: Users are advised to upgrade to the latest version of PHP available. For more details about PHP releases and patches please visit PHP Homepage.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Reference: htt
Comment:
ScannerOutput:
Port: 80/tcp
Date: Tue, 13 Nov 2018 18:22:44 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8
<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>
<div class=parentpage>
<div id=header
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ012868
Vulnerability: PHP Fileinfo libmagic Multiple Denial of Service Vulnerabilities
ToDo: Users are advised to upgrade to the latest version 5.5.10 or 5.4.26. Latest version can be downloaded from herePatch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Reference
Comment:
ScannerOutput:
Port: 443/tcp
Date: Tue, 13 Nov 2018 18:22:45 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8
<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>
<div class=parentpage>
<div id=header
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ012868
Vulnerability: PHP Fileinfo libmagic Multiple Denial of Service Vulnerabilities
ToDo: Users are advised to upgrade to the latest version 5.5.10 or 5.4.26. Latest version can be downloaded from herePatch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Reference: Comment:
ScannerOutput:
Port: 80/tcp
Date: Tue, 13 Nov 2018 18:22:44 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8
<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>
<div class=parentpage>
<div id=header
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ012913
Vulnerability: PHP 5.5.x And 5.4.x Denial Of Service Vulnerability
ToDo: Users are advised to upgrade to the latest version 5.5.11. Latest version can be downloaded from herePatch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.5.11
CertRef:
Tool Refe
Comment:
ScannerOutput:
Port: 443/tcp
Date: Tue, 13 Nov 2018 18:22:45 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8
<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>
<div class=parentpage>
<div id=header
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ012913
Vulnerability: PHP 5.5.x And 5.4.x Denial Of Service Vulnerability
ToDo: Users are advised to upgrade to the latest version 5.5.11. Latest version can be downloaded from herePatch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.5.11
CertRef:
Tool Reference:
ScannerOutput:
Port: 80/tcp
Date: Tue, 13 Nov 2018 18:22:44 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8
<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>
<div class=parentpage>
<div id=header
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ012969
Vulnerability: PHP CDF File Parsing Multiple Denial of Service Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the software available. For more information, please visit:PHP 5.4.29PHP 5.5.13Patch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Refere
Comment:
ScannerOutput:
Port: 443/tcp
Date: Tue, 13 Nov 2018 18:22:45 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8
<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>
<div class=parentpage>
<div id=header
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ012969
Vulnerability: PHP CDF File Parsing Multiple Denial of Service Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the software available. For more information, please visit:PHP 5.4.29PHP 5.5.13Patch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Referenc
Comment:
ScannerOutput:
Port: 80/tcp
Date: Tue, 13 Nov 2018 18:22:44 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8
<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>
<div class=parentpage>
<div id=header
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ013035
Vulnerability: PHP Prior to 5.4.32/5.5.16 Multiple Vulnerabilities
ToDo: Update to version 5.4.32 or 5.5.16. For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.5.16 PHP 5.4.32
CertRef:
Tool Reference: h
Comment:
ScannerOutput:
Port: 443/tcp
Date: Tue, 13 Nov 2018 18:22:45 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8
<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>
<div class=parentpage>
<div id=header
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ013035
Vulnerability: PHP Prior to 5.4.32/5.5.16 Multiple Vulnerabilities
ToDo: Update to version 5.4.32 or 5.5.16. For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP 5.5.16 PHP 5.4.32
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 80/tcp
Date: Tue, 13 Nov 2018 18:22:44 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8
<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>
<div class=parentpage>
<div id=header
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ013083
Vulnerability: PHP unserialize() Use-After-Free Vulnerability
ToDo: Users are advised to upgrade to the latest version of the PHP.For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
QID: 13083 detected on port 443
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ013083
Vulnerability: PHP unserialize() Use-After-Free Vulnerability
ToDo: Users are advised to upgrade to the latest version of the PHP.For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Reference: Comment:
ScannerOutput:
Port: 80/tcp
QID: 13083 detected on port 80
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ013085
Vulnerability: PHP Denial of Service and Code Execution Vulnerability
ToDo: The vendor has confirmed the vulnerability, but no patch is available as of now, however vendor has released fixes for these vulnerabilities via snapshots/ revisions.Workaround:For more information regarding snapshot/revision download please visit PHP
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
QID: 13085 detected on port 443
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ013085
Vulnerability: PHP Denial of Service and Code Execution Vulnerability
ToDo: The vendor has confirmed the vulnerability, but no patch is available as of now, however vendor has released fixes for these vulnerabilities via snapshots/ revisions.Workaround:For more information regarding snapshot/revision download please visit PHP
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 80/tcp
QID: 13085 detected on port 80
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ013098
Vulnerability: PHP Multiple Remote Code Execution Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the PHP.For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Refere
Comment:
ScannerOutput:
Port: 443/tcp
PHP Multiple Remote Code Execution Vulnerabilities detected on port 443 over TCP.
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ013098
Vulnerability: PHP Multiple Remote Code Execution Vulnerabilities
ToDo: Users are advised to upgrade to the latest version of the PHP.For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Reference
Comment:
ScannerOutput:
Port: 80/tcp
PHP Multiple Remote Code Execution Vulnerabilities detected on port 80 over TCP.
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ013108
Vulnerability: PHP Multiple Remote Code Execution Vulnerabilities (GHOST)
ToDo: Users are advised to upgrade to the latest version of the PHP. For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Reference
Comment:
ScannerOutput:
Port: 443/tcp
PHP Multiple Remote Code Execution Vulnerabilities detected on port 443 over TCP.
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ013108
Vulnerability: PHP Multiple Remote Code Execution Vulnerabilities (GHOST)
ToDo: Users are advised to upgrade to the latest version of the PHP. For more information, please refer to the PHP Web site.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Reference: /pub/QIDsearch?id=013108
Comment:
ScannerOutput:
Port: 80/tcp
PHP Multiple Remote Code Execution Vulnerabilities detected on port 80 over TCP.
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ038657
Vulnerability: Birthday attacks against TLS ciphers with 64bit block size vulnerability (Sweet32)
ToDo: Disable and stop using DES, 3DES, IDEA or RC2 ciphers.
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
CIPHER KEY-EXCHANGE AUTHENTICATION MAC ENCRYPTION(KEY-STRENGTH) GRADE
TLSv1 WITH 64-BIT CBC CIPHERS IS SUPPORTED
DES-CBC3-SHA RSA RSA SHA1 3DES(168) MEDIUM
EDH-RSA-DES-CBC3-SHA DH RSA SHA1 3DES(168) MEDIUM
ECDHE-RSA-DES-CBC3-SHA ECDH RSA SHA1 3DES(168) MEDIUM
TLSv1.1 WITH 64-BIT CBC CIPHERS IS SUPPORTED
DES-CBC3-SHA RSA RSA SHA1 3DES(168) MEDIUM
EDH-RSA-DES-CBC3-SHA DH RSA SHA1 3DES(168) MEDIUM
ECDHE-RSA-DES-CBC3-SHA ECDH RSA SHA1 3DES(168) MEDIUM
TLSv1.2 WITH 64-BIT CBC CIPHERS IS SUPPORTED
DES-CBC3-SHA RSA RSA SHA1 3DES(168) MEDIUM
EDH-RSA-DES-CBC3-SHA DH RSA SHA1 3DES(168) MEDIUM
ECDHE-RSA-DES-CBC3-SHA ECDH RSA SHA1 3DES(168) MEDIUM
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ086172
Vulnerability: Apache HTTP Server Prior to 2.4.16/2.2.31 Multiple Vulnerabilities
ToDo: These vulnerabilities have been patched in Apache. Refer to Apache httpd 2.4.16 Changelog and Apache httpd 2.2.31 Changelog or your Linux distro for further details.Patch:Following are links for downloading patches to fix the vulnerabilities: Apache 2.4.16/2.2.31: Apache
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
QID 86172 detected on port 443 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ086172
Vulnerability: Apache HTTP Server Prior to 2.4.16/2.2.31 Multiple Vulnerabilities
ToDo: These vulnerabilities have been patched in Apache. Refer to Apache httpd 2.4.16 Changelog and Apache httpd 2.2.31 Changelog or your Linux distro for further details.Patch:Following are links for downloading patches to fix the vulnerabilities: Apache 2.4.16/2.2.31: Apache
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 80/tcp
QID 86172 detected on port 80 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 1PQ086473
Vulnerability: Web Server HTTP Trace/Track Method Support Cross-Site Tracing Vulnerability
ToDo: Solutions for some of the common Web servers are supplied below. For other Web servers, please check your vendor's documentation.Apache: Recent Apache versions have a Rewrite module that allows HTTP requests to be rewritten or handled in a specific way. Compile the Apache server with the mod_rewrite module. You might need to uncomment the 'AddModule' and 'LoadModule' directives in the httpd.conf configuration file. Add the following lines for each virtualhost in your configuration file (Please note that, by default, Rewrite configurations are not inherited. This means that you need to have Rewrite directives for each virtual host in which you wish to use it):< IfModule mod_rewrite.c> RewriteEngine onRewriteCond %{REQUEST_METHOD} ^TRACERewriteRule .* - [F]< /IfModule> With this configuration, Apache catches all TRACE requests, and replies with a page reporting the request as forbidden. None of the original request's contents are echoed back.A slightly tighter fix is to use:<
IfModule mod_rewrite.c> RewriteEngine onRewriteCond %{REQUEST_METHOD} !^(GET|POST|HEAD)$RewriteRule .* - [F]< /IfModule> Please note that RewriteEngine can be processor intensive and may impact the web server performance. The trace method can also be controlled by use of the TraceEnable directive.In the httpd.conf add or modify:TraceEnable OffMicrosoft IIS: Microsoft released URLScan, which can be used to screen all incoming requests based on customized rulesets. URLScan can be used to sanitize or disable the TRACE requests from the clients. Note that IIS aliases 'TRACK' to 'TRACE'. Therefore, if URLScan is used to specfically block the TRACE method, the TRACK method should also be added to the filter.URLScan uses the 'urlscan.ini' configuration file, usually in \\System32\\InetSrv\\URLScan directory. In that, we have two sections - AllowVerbs and DenyVerbs. The former is used if the UseAllowVerbs variable is set to 1, else (if its set to 0), the DenyVerbs are used. Clearly, either
can be used, depending on whether we want a Default-Deny-Explicit-Allow or a Default-Allow-Explicit-Deny policy. To disallow TRACE and TRACK methods through URLScan, first remove 'TRACK', 'TRACE' methods from the 'AllowVerbs' section and add them to the 'DenyVerbs' section. With this, URLScan will disallow all 'TRACE' and 'TRACK' methods, and generate an error page for all requests using that method. To enable the changes, restart the 'World Wide Web Publishing Service' from the 'Services' Control Panel item.For more details about other web servers : Cert Advisory.
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
TRACE / HTTP/1.1
Host:
Via: <script>alert('QualysXSS');</script>
HTTP/1.1 200 OK
Date: Tue, 13 Nov 2018 18:23:29 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
Transfer-Encoding: chunked
Content-Type: message/http
TRACE / HTTP/1.1
Host:
Via: <script>alert('QualysXSS');</script>
Qualys-Scan: VM
-CR-TRACE / HTTP/1.0
Via: <script>alert('QualysXSS');</script>
HTTP/1.1 200 OK
Date: Tue, 13 Nov 2018 18:23:29 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
Connection: close
Content-Type: message/http
TRACE / HTTP/1.0
Via: <script>alert('QualysXSS');</script>
Qualys-Scan: VM
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 1PQ086473
Vulnerability: Web Server HTTP Trace/Track Method Support Cross-Site Tracing Vulnerability
ToDo: Solutions for some of the common Web servers are supplied below. For other Web servers, please check your vendor's documentation.Apache: Recent Apache versions have a Rewrite module that allows HTTP requests to be rewritten or handled in a specific way. Compile the Apache server with the mod_rewrite module. You might need to uncomment the 'AddModule' and 'LoadModule' directives in the httpd.conf configuration file. Add the following lines for each virtualhost in your configuration file (Please note that, by default, Rewrite configurations are not inherited. This means that you need to have Rewrite directives for each virtual host in which you wish to use it):< IfModule mod_rewrite.c> RewriteEngine onRewriteCond %{REQUEST_METHOD} ^TRACERewriteRule .* - [F]< /IfModule> With this configuration, Apache catches all TRACE requests, and replies with a page reporting the request as forbidden. None of the original request's contents are echoed back.A slightly tighter fix is to use:<
IfModule mod_rewrite.c> RewriteEngine onRewriteCond %{REQUEST_METHOD} !^(GET|POST|HEAD)$RewriteRule .* - [F]< /IfModule> Please note that RewriteEngine can be processor intensive and may impact the web server performance. The trace method can also be controlled by use of the TraceEnable directive.In the httpd.conf add or modify:TraceEnable OffMicrosoft IIS: Microsoft released URLScan, which can be used to screen all incoming requests based on customized rulesets. URLScan can be used to sanitize or disable the TRACE requests from the clients. Note that IIS aliases 'TRACK' to 'TRACE'. Therefore, if URLScan is used to specfically block the TRACE method, the TRACK method should also be added to the filter.URLScan uses the 'urlscan.ini' configuration file, usually in \\System32\\InetSrv\\URLScan directory. In that, we have two sections - AllowVerbs and DenyVerbs. The former is used if the UseAllowVerbs variable is set to 1, else (if its set to 0), the DenyVerbs are used. Clearly, either
can be used, depending on whether we want a Default-Deny-Explicit-Allow or a Default-Allow-Explicit-Deny policy. To disallow TRACE and TRACK methods through URLScan, first remove 'TRACK', 'TRACE' methods from the 'AllowVerbs' section and add them to the 'DenyVerbs' section. With this, URLScan will disallow all 'TRACE' and 'TRACK' methods, and generate an error page for all requests using that method. To enable the changes, restart the 'World Wide Web Publishing Service' from the 'Services' Control Panel item.For more details about other web servers : Cert Advisory.
CertRef:
Tool Reference: Comment:
ScannerOutput:
Port: 80/tcp
TRACE / HTTP/1.1
Host:
Via: <script>alert('QualysXSS');</script>
HTTP/1.1 200 OK
Date: Tue, 13 Nov 2018 18:23:55 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
Transfer-Encoding: chunked
Content-Type: message/http
TRACE / HTTP/1.1
Host:
Via: <script>alert('QualysXSS');</script>
Qualys-Scan: VM
-CR-TRACE / HTTP/1.0
Via: <script>alert('QualysXSS');</script>
HTTP/1.1 200 OK
Date: Tue, 13 Nov 2018 18:23:55 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
Connection: close
Content-Type: message/http
TRACE / HTTP/1.0
Via: <script>alert('QualysXSS');</script>
Qualys-Scan: VM
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ086488
Vulnerability: Apache HTTP Server Prior to 2.4.20 Thread Starvation Vulnerability
ToDo: These vulnerability have been patched in Apache 2.4.20. Refer to Apache httpd 2.4.20 Changelog or your Linux distro for further details.Patch:Following are links for downloading patches to fix the vulnerabilities: Apache 2.4.20: Apache 2.4.x
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
QID 86488 detected on port 443 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ086488
Vulnerability: Apache HTTP Server Prior to 2.4.20 Thread Starvation Vulnerability
ToDo: These vulnerability have been patched in Apache 2.4.20. Refer to Apache httpd 2.4.20 Changelog or your Linux distro for further details.Patch:Following are links for downloading patches to fix the vulnerabilities: Apache 2.4.20: Apache 2.4.x
CertRef:
Tool Reference: Comment:
ScannerOutput:
Port: 80/tcp
QID 86488 detected on port 80 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ086489
Vulnerability: Apache HTTP Server Prior to 2.4.12 Multiple Vulnerabilities
ToDo: These vulnerabilities have been patched in Apache 2.4.12. Refer to Apache httpd 2.4.12 Changelog or your Linux distro for further details.Patch:Following are links for downloading patches to fix the vulnerabilities: Apache 2.4.12: Apache 2.4.xVirtual Patches:Trend Micro Virtual PatchingVirtual Patch #1006305: 1006305 - Apache HTTP Server 'mod_cache' Denial Of Service Vulnerability
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
QID 86488 detected on port 443 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ086489
Vulnerability: Apache HTTP Server Prior to 2.4.12 Multiple Vulnerabilities
ToDo: These vulnerabilities have been patched in Apache 2.4.12. Refer to Apache httpd 2.4.12 Changelog or your Linux distro for further details.Patch:Following are links for downloading patches to fix the vulnerabilities: Apache 2.4.12: Apache 2.4.xVirtual Patches:Trend Micro Virtual PatchingVirtual Patch #1006305: 1006305 - Apache HTTP Server 'mod_cache' Denial Of Service Vulnerability
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 80/tcp
QID 86488 detected on port 80 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ086491
Vulnerability: Apache HTTP Server Remote Denial of Service Vulnerability
ToDo: The vulnerability have been patched in Apache 2.4.7. Refer to Apache httpd 2.4.7 Changelog or your Linux distro for further details.Patch:Following are links for downloading patches to fix the vulnerabilities: Apache 2.4.7: Apache 2.4.x
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
QID 86491 detected on port 443 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ086491
Vulnerability: Apache HTTP Server Remote Denial of Service Vulnerability
ToDo: The vulnerability have been patched in Apache 2.4.7. Refer to Apache httpd 2.4.7 Changelog or your Linux distro for further details.Patch:Following are links for downloading patches to fix the vulnerabilities: Apache 2.4.7: Apache 2.4.x
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 80/tcp
QID 86491 detected on port 80 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ086728
Vulnerability: Web Server Uses Plain-Text Form Based Authentication
ToDo: Please contact the vendor of the hardware/software for a possible fix for the issue. For custom applications, ensure that data sent via HTML login forms is encrypted before being sent from the client to the host.
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 80/tcp
GET /nagiosxi/login.php HTTP/1.1
Host
Connection: Keep-Alive
<form id=loginForm method=post action=/nagiosxi/login.php autocomplete='off'>
<input type=hidden name=nsp value=413b290a57c54b9cd1df0620bedff4f806950b6bd5e0bc869d3e8f250d9c3b9c>
<input type=hidden name=page value=auth>
<input type=hidden name=debug value=>
<input type=hidden name=pageopt value=login>
Login
<div style=margin-bottom: 10px;>
<input type=text class=form-control placeholder=Username value= name=username id=usernameBox autocomplete='off'>
</div>
<div>
<input type=password class=form-control placeholder=Password name=password id=passwordBox autocomplete='off'>
</div>
<div>
<button type=submit class=submitbutton login btn btn-sm btn-primary id=loginButton name=loginButton>Login</button>
</div>
</form>
POST /nagiosxi/login.php HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ087253
Vulnerability: Apache HTTP Server Multiple Denial of Service Vulnerabilities
ToDo: These vulnerabilities have been patched in Apache 2.4.9. Refer to Apache httpd 2.4.9 Changelog or your Linux distro for further details.Patch:Following are links for downloading patches to fix the vulnerabilities: Apache 2.4.9Virtual Patches:Trend Micro Virtual PatchingVirtual Patch #1006027: 1006027 - Apache HTTP Server Denial Of Service Vulnerability (CVE-2014-0098)
CertRef:
Tool Reference:
Comment:
ScannerOutput:
QID 87253 detected on port 80 -
Date: Tue, 13 Nov 2018 18:22:44 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8
<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>
<div class=parentpage>
<div id=headerQID 87253 detected on port 443 -
Date: Tue, 13 Nov 2018 18:22:45 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8
<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>
<div class=parentpage>
<div id=header
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ087264
Vulnerability: Apache HTTP Server Prior to 2.4.10 Multiple Vulnerabilities
ToDo: These vulnerabilities have been patched in Apache 2.4.10. Refer to Apache httpd 2.4.10 Changelog or your Linux distro for further details.Patch:Following are links for downloading patches to fix the vulnerabilities: Apache 2.4.10: Apache 2.4.xVirtual Patches:Trend Micro Virtual PatchingVirtual Patch #1006158: 1006158 - Apache HTTP Server Remote Denial Of Service Vulnerability (CVE-2014-0117)
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
QID 87264 detected on port 443 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ087264
Vulnerability: Apache HTTP Server Prior to 2.4.10 Multiple Vulnerabilities
ToDo: These vulnerabilities have been patched in Apache 2.4.10. Refer to Apache httpd 2.4.10 Changelog or your Linux distro for further details.Patch:Following are links for downloading patches to fix the vulnerabilities: Apache 2.4.10: Apache 2.4.xVirtual Patches:Trend Micro Virtual PatchingVirtual Patch #1006158: 1006158 - Apache HTTP Server Remote Denial Of Service Vulnerability (CVE-2014-0117)
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 80/tcp
QID 87264 detected on port 80 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ087321
Vulnerability: PHP Multiple Vulnerabilities (MS-ISAC ADVISORY NUMBER: 2018-003)
ToDo: Customers are advised to upgrade to the latest version of PHP. Please refer to MS-ISAC ADVISORY-2018-003 for more information about these vulnerabilities.Patch:Following are links for downloading patches to fix the vulnerabilities: Download PHP
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
QID 87321 detected on port 443 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ087321
Vulnerability: PHP Multiple Vulnerabilities (MS-ISAC ADVISORY NUMBER: 2018-003)
ToDo: Customers are advised to upgrade to the latest version of PHP. Please refer to MS-ISAC ADVISORY-2018-003 for more information about these vulnerabilities.Patch:Following are links for downloading patches to fix the vulnerabilities: Download PHP
CertRef:
Tool Reference: Comment:
ScannerOutput:
Port: 80/tcp
QID 87321 detected on port 80 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ087329
Vulnerability: Apache HTTP Server Prior to 2.4.30 Multiple Vulnerabilities
ToDo: These vulnerabilities have been patched in Apache. Refer to Apache httpd 2.4.30 Changelog or your Linux distro for further details.Patch:Following are links for downloading patches to fix the vulnerabilities: Apache 2.4.30: Apache 2.4.x
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
QID 87329 detected on port 443 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ087329
Vulnerability: Apache HTTP Server Prior to 2.4.30 Multiple Vulnerabilities
ToDo: These vulnerabilities have been patched in Apache. Refer to Apache httpd 2.4.30 Changelog or your Linux distro for further details.Patch:Following are links for downloading patches to fix the vulnerabilities: Apache 2.4.30: Apache 2.4.x
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 80/tcp
QID 87329 detected on port 80 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ087334
Vulnerability: PHP Multiple Vulnerabilities (MS-ISAC : 2018-046)
ToDo: Customers are advised to upgrade to the latest version of PHP. Please refer to MS-ISAC ADVISORY-2018-046 for more information about these vulnerabilities.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
QID 87334 detected on port 443 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 2PQ087334
Vulnerability: PHP Multiple Vulnerabilities (MS-ISAC : 2018-046)
ToDo: Customers are advised to upgrade to the latest version of PHP. Please refer to MS-ISAC ADVISORY-2018-046 for more information about these vulnerabilities.Patch:Following are links for downloading patches to fix the vulnerabilities: PHP
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 80/tcp
QID 87334 detected on port 80 - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ089009
Vulnerability: Apache HTTP Server mod_mime Buffer Overread
ToDo: These vulnerabilities have been patched in Apache. Refer to Apache httpd 2.4.27 Changelog, Apache httpd 2.2.34 Changelog, or your Linux distro for further details.Patch:Following are links for downloading patches to fix the vulnerabilities: CVE-2017-7679: Apache 2.2.x CVE-2017-7679: Apache 2.4.x
CertRef:
Tool Reference: Comment:
ScannerOutput:
QID: 89009 detected on port 80 over TCP -
Date: Tue, 13 Nov 2018 18:22:44 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8
<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>
<div class=parentpage>
<div id=headerQID: 89009 detected on port 443 over TCP -
Date: Tue, 13 Nov 2018 18:22:45 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
X-Powered-By: PHP/5.4.16
Content-Length: 2968
Connection: close
Content-Type: text/html; charset=UTF-8
<!DOCTYPE HTML>
<html>
<head>
<title>Nagios XI</title>
<meta name=ROBOTS content=NOINDEX, NOFOLLOW>
<meta http-equiv=Content-Type content=text/html; charset=UTF-8 />
<link rel=shortcut icon href=/nagiosxi/images/favicon.ico type=image/ico>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/bootstrap.3.min.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/base.css'>
<LINK REL='stylesheet' TYPE='text/css' HREF='/nagiosxi/includes/css/themes/modern.css'>
<script type='text/javascript' src='/nagiosxi/includes/js/jquery/jquery-3.3.1.min.js'></script>
<script type='text/javascript' src='/nagiosxi/includes/js/core.js'></script>
</head>
<body>
<div class=parentpage>
<div id=header
----------------------------------------
Date: 2018-11-13 18:21:27
Vuln#: 3PQ105664
Vulnerability: EOL/Obsolete Software: PHP 5.4.x Detected
ToDo: Upgrade to 5.5 or later. For more information, please refer to the PHP 5.4 to PHP 5.5 Migration Guide.
CertRef:
Tool Reference:
Comment:
ScannerOutput:
Port: 443/tcp
QID: 105664 detected on port 443 over TCP - Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
----------------------------------------