you've must have got a phpinfo() page running somewhere ....
you can grep your www directory for that one ...

JJ

On 9/12/07, Arend P. van der Veen <[EMAIL PROTECTED]> wrote:
>
> Wade Chandler wrote:
> > Does it give you any paths to this PHP application? I haven't seen
> anything like it from scanners
> > on my server.
> >
> > Wade
> >
> > --- "Arend P. van der Veen" <[EMAIL PROTECTED]> wrote:
> >
> >> Hi,
> >>
> >> I recently setup a server using Tomcat 5.5 on FreeBSD 6.2.  I thought I
> >> had everything locked down.
> >>
> >> I run a nessus scan and found a strange Vulnerability.  It says that
> states:
> >>
> >> The remote web server contains a PHP application that is affected by
> >> multiple vulnerabilities.
> >>
> >> I am not using PHP.  Has anyone else seen this?
> >>
> >> Thanks,
> >> Arend
> >>
> >> ---------------------------------------------------------------------
> >> To start a new topic, e-mail: users@tomcat.apache.org
> >> To unsubscribe, e-mail: [EMAIL PROTECTED]
> >> For additional commands, e-mail: [EMAIL PROTECTED]
> >>
> >>
> >
> >
> > ---------------------------------------------------------------------
> > To start a new topic, e-mail: users@tomcat.apache.org
> > To unsubscribe, e-mail: [EMAIL PROTECTED]
> > For additional commands, e-mail: [EMAIL PROTECTED]
> >
> >
> Hi Wade,
>
> I have tomcat sitting on 127.0.0.1:8080 (http) and 127.0.0.1:8081
> (https) and use ipfw to forward from port 80 and 443 respectively. Could
> this part of my problem?  I am wondering if this is some kind of false
> positive.  Following is an excerpt from the Nessus Scan Report:
>
> ******************************************************************
> Synopsis :
>
> The remote web server contains a PHP application that is affected by
> multiple vulnerabilities.
>
> Description :
>
> The remote host is running phpSysInfo, a PHP application that parses
> the /proc entries on Linux/Unix systems and displays them in HTML.
>
> The installed version of phpSysInfo on the remote host has a design
> flaw in its globalization layer such that the script's variables can
> be overwritten independent of PHP's 'register_globals' setting. By
> exploiting this issue, an attacker may be able to read arbitrary files
> on the remote host (if PHP's 'magic_quotes_gpc' setting is off) and
> even execute arbitrary PHP code, both subject to the privileges of the
> web server user id.
>
> In addition, the application fails to sanitize user-supplied input
> before using it in dynamically-generated pages, which can be used to
> conduct cross-site scripting and HTTP response splitting attacks.
>
> See also :
>
> http://www.hardened-php.net/advisory_222005.81.html
>
> Solution :
>
> Upgrade to phpSysInfo 2.4.1 or later.
>
> Risk factor :
>
> Low / CVSS Base Score : 2.3
> (AV:R/AC:L/Au:NR/C:N/I:P/A:N/B:N)
> CVE : CVE-2003-0536, CVE-2005-0870, CVE-2005-3347, CVE-2005-3348
> BID : 7286, 15396, 15414
> Nessus ID : 20215
> ***********************************************************************
>
> Thanks,
> Arens
>
> ---------------------------------------------------------------------
> To start a new topic, e-mail: users@tomcat.apache.org
> To unsubscribe, e-mail: [EMAIL PROTECTED]
> For additional commands, e-mail: [EMAIL PROTECTED]
>
>

Reply via email to