[Nikto-discuss] False positives ?
Thomas Raef
traef at ebasedsecurity.com
Mon May 11 13:51:30 UTC 2009
I've noticed these false positives as well.
If you have a default 404 page, you'll see these false positives as the URL issued with the GET command does return a page - your default 404 page so it assumes that since it issued a command and received a result the command must have worked.
That's been my findings anyway. Anyone have more information?
Thomas J. Raef
www.ebasedsecurity.com
"You're either hardened, or you're hacked!"
www.wewatchyourwebsite.com
"We Watch Your Website - so you don't have to!"
________________________________
From: nikto-discuss-bounces at attrition.org on behalf of titans team
Sent: Mon 5/11/2009 8:41 AM
To: nikto-discuss at attrition.org
Subject: [Nikto-discuss] False positives ?
Hi guys,
running a scan against my apache web server shows that.
+ OSVDB-0: GET /scripts/banner.cgi : This CGI may allow attackers to read any file on the system.
+ OSVDB-0: GET /scripts/bannereditor.cgi : This CGI may allow attackers to read any file on the system.
+ OSVDB-0: GET /sips/sipssys/users/a/admin/user : SIPS v0.2.2 allows user account info (including password) to be retrieved remotely.
+ OSVDB-0: GET /scripts/addbanner.cgi : This CGI may allow attackers to read any file on the system.
+ OSVDB-0: GET /scripts/ans.pl?p=../../../../../usr/bin/id|&blah : Avenger's News System allows commands to be issued remotely.
+ OSVDB-0: GET /scripts/ans/ans.pl?p=../../../../../usr/bin/id|&blah : Avenger's News System allows commands to be issued remotely.
+ OSVDB-0: GET /admentor/adminadmin.asp : Version 2.11 of AdMentor is vulnerable to SQL injection during login, in the style of: ' or =
+ OSVDB-0: GET /index.php?module=My_eGallery : My_eGallery prior to 3.1.1.g are vulnerable to a remote execution bug via SQL command injection.
+ OSVDB-0: GET /scripts/Count.cgi : This may allow attackers to execute arbitrary commands on the server
+ OSVDB-0: GET /isapi/count.pl? : AN HTTPd default script may allow writing over arbitrary files with a new content of '1', which could allow a trivial DoS. Append /../../../../../ctr.dll to replac
e this file's contents, for example.
+ OSVDB-376: GET /admin/contextAdmin/contextAdmin.html : Tomcat may be configured to let attackers read arbitrary files. Restrict access to /admin.
+ OSVDB-3092: GET /cgi-bin/textcounter.pl : This might be interesting...
+ OSVDB-13483: GET /adsamples/config/site.csc : Contains SQL username/password
+ OSVDB-3092: GET /advworks/equipment/catalog_type.asp : This might be interesting...
+ OSVDB-3092: GET /scripts/counter.exe : This might be interesting...
+ OSVDB-3233: GET /scripts/fpcount.exe : Default FrontPage CGI found.
The thing is that none of these files exist on the server.
Any idea why this shows up ?
Best Regards,
Nick.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://attrition.org/pipermail/nikto-discuss/attachments/20090511/3eb3d889/attachment.html
More information about the Nikto-discuss
mailing list