Good Evening Aren

Do you have data on this 'magic_quotes_gpc'  vulnerability
Thanks for the headsup--

Martin--
----- Original Message -----
From: "Arend P. van der Veen" <[EMAIL PROTECTED]>
To: "Tomcat Users List" <users@tomcat.apache.org>
Sent: Friday, September 14, 2007 11:14 PM
Subject: Re: PHP Security Vulnerability???


> Joseph Millet wrote:
> > you've must have got a phpinfo() page running somewhere ....
> > you can grep your www directory for that one ...
> >
> > JJ
> >
> > On 9/12/07, Arend P. van der Veen <[EMAIL PROTECTED]> wrote:
> >> Wade Chandler wrote:
> >>> Does it give you any paths to this PHP application? I haven't seen
> >> anything like it from scanners
> >>> on my server.
> >>>
> >>> Wade
> >>>
> >>> --- "Arend P. van der Veen" <[EMAIL PROTECTED]> wrote:
> >>>
> >>>> Hi,
> >>>>
> >>>> I recently setup a server using Tomcat 5.5 on FreeBSD 6.2.  I thought
I
> >>>> had everything locked down.
> >>>>
> >>>> I run a nessus scan and found a strange Vulnerability.  It says that
> >> states:
> >>>> The remote web server contains a PHP application that is affected by
> >>>> multiple vulnerabilities.
> >>>>
> >>>> I am not using PHP.  Has anyone else seen this?
> >>>>
> >>>> Thanks,
> >>>> Arend
> >>>>
> >>>> ---------------------------------------------------------------------
> >>>> To start a new topic, e-mail: users@tomcat.apache.org
> >>>> To unsubscribe, e-mail: [EMAIL PROTECTED]
> >>>> For additional commands, e-mail: [EMAIL PROTECTED]
> >>>>
> >>>>
> >>>
> >>> ---------------------------------------------------------------------
> >>> To start a new topic, e-mail: users@tomcat.apache.org
> >>> To unsubscribe, e-mail: [EMAIL PROTECTED]
> >>> For additional commands, e-mail: [EMAIL PROTECTED]
> >>>
> >>>
> >> Hi Wade,
> >>
> >> I have tomcat sitting on 127.0.0.1:8080 (http) and 127.0.0.1:8081
> >> (https) and use ipfw to forward from port 80 and 443 respectively.
Could
> >> this part of my problem?  I am wondering if this is some kind of false
> >> positive.  Following is an excerpt from the Nessus Scan Report:
> >>
> >> ******************************************************************
> >> Synopsis :
> >>
> >> The remote web server contains a PHP application that is affected by
> >> multiple vulnerabilities.
> >>
> >> Description :
> >>
> >> The remote host is running phpSysInfo, a PHP application that parses
> >> the /proc entries on Linux/Unix systems and displays them in HTML.
> >>
> >> The installed version of phpSysInfo on the remote host has a design
> >> flaw in its globalization layer such that the script's variables can
> >> be overwritten independent of PHP's 'register_globals' setting. By
> >> exploiting this issue, an attacker may be able to read arbitrary files
> >> on the remote host (if PHP's 'magic_quotes_gpc' setting is off) and
> >> even execute arbitrary PHP code, both subject to the privileges of the
> >> web server user id.
> >>
> >> In addition, the application fails to sanitize user-supplied input
> >> before using it in dynamically-generated pages, which can be used to
> >> conduct cross-site scripting and HTTP response splitting attacks.
> >>
> >> See also :
> >>
> >> http://www.hardened-php.net/advisory_222005.81.html
> >>
> >> Solution :
> >>
> >> Upgrade to phpSysInfo 2.4.1 or later.
> >>
> >> Risk factor :
> >>
> >> Low / CVSS Base Score : 2.3
> >> (AV:R/AC:L/Au:NR/C:N/I:P/A:N/B:N)
> >> CVE : CVE-2003-0536, CVE-2005-0870, CVE-2005-3347, CVE-2005-3348
> >> BID : 7286, 15396, 15414
> >> Nessus ID : 20215
> >> ***********************************************************************
> >>
> >> Thanks,
> >> Arens
> >>
> >> ---------------------------------------------------------------------
> >> To start a new topic, e-mail: users@tomcat.apache.org
> >> To unsubscribe, e-mail: [EMAIL PROTECTED]
> >> For additional commands, e-mail: [EMAIL PROTECTED]
> >>
> >>
> >
>
> Hi,
>
> This turned out to be a false positive.
>
> I use /cgi-bin as a url-pattern for a servlet mapping:
>
>      <servlet-mapping>
>          <servlet-name>ProxyServlet</servlet-name>
>          <url-pattern>/cgi-bin/*</url-pattern>
>      </servlet-mapping>
>
> I essentially was sending references to cgi-bin to apache listening on
> the loopback.  I also set a security-constraint for this url-pattern.
> Finally, I set the login-conf to form based authentication.  When Nessus
> tried to access URL such s /cgi-bin/phpinfo.pgp it returned an http
> error of 200 even though it did not exist.  Not sure why.  But Nessus
> assumed that the 200 meant that it existed.  When I switched the login
> configuration to basic authentication the problem went away.  This had
> something to do with form based authentication.
>
> A finally found that if a simply changing the URL binding to from
> cgi-bin to xyz.  Now with form based authentication everything works.
>
> Thanks,
> Arend
>
> ---------------------------------------------------------------------
> To start a new topic, e-mail: users@tomcat.apache.org
> To unsubscribe, e-mail: [EMAIL PROTECTED]
> For additional commands, e-mail: [EMAIL PROTECTED]
>
>


---------------------------------------------------------------------
To start a new topic, e-mail: users@tomcat.apache.org
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to