Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- I Summary
- =========
- This document reports on the results of an automatic security scan.
- The report first summarises the results found.
- Then, for each host, the report describes every issue found.
- Please consider the advice given in each description, in order to rectify
- the issue.
- All dates are displayed using the timezone "Coordinated Universal Time",
- which is abbreviated "UTC".
- Vendor security updates are not trusted.
- Overrides are on. When a result has an override, this report uses the
- threat of the override.
- Notes are included in the report.Information on overrides is included in the report.
- This report might not show details of all issues that were found.
- This report contains all 29 results selected by the
- filtering described above. Before filtering there were 29 results.
- Scan started: Tue May 21 02:50:15 2019 UTC
- Scan ended: Tue May 21 03:19:49 2019 UTC
- Task: New Quick Task
- Host Summary
- ************
- Host High Medium Low Log False Positive
- 151.236.219.217 1 10 0 18 0
- Total: 1 1 10 0 18 0
- II Results per Host
- ===================
- Host 151.236.219.217
- ********************
- Scanning of this host started at: Tue May 21 02:50:41 2019 UTC
- Number of results: 29
- Port Summary for Host 151.236.219.217
- -------------------------------------
- Service (Port) Threat Level
- 21/tcp Log
- 80/tcp High
- general/CPE-T Log
- general/tcp Medium
- 22/tcp Medium
- Security Issues for Host 151.236.219.217
- ----------------------------------------
- Issue
- -----
- NVT: 1.3.6.1.4.1.25623.1.0.813812
- OID: 1.3.6.1.4.1.25623.1.0.813812
- Threat: Medium
- Port: 80/tcp
- Vulnerability Detection Result:
- Installed version: 2.4.25
- Fixed version: 2.4.34
- Installation
- path / port: 80/tcp
- Log Method:
- Details:
- 1.3.6.1.4.1.25623.1.0.813812
- (OID: 1.3.6.1.4.1.25623.1.0.813812)
- Version used: $Revision: 12116 $
- References:
- CERT: CB-K18/0805
- , DFN-CERT-2019-0359
- , DFN-CERT-2019-0351
- , DFN-CERT-2018-2316
- , DFN-CERT-2018-2011
- , DFN-CERT-2018-1642
- , DFN-CERT-2018-1412
- Issue
- -----
- NVT: 1.3.6.1.4.1.25623.1.0.811237
- OID: 1.3.6.1.4.1.25623.1.0.811237
- Threat: Medium
- Port: 80/tcp
- Vulnerability Detection Result:
- Installed version: 2.4.25
- Fixed version: 2.4.27
- Log Method:
- Details:
- 1.3.6.1.4.1.25623.1.0.811237
- (OID: 1.3.6.1.4.1.25623.1.0.811237)
- Version used: $Revision: 14173 $
- References:
- CERT: CB-K18/0066
- , CB-K17/2013
- , CB-K17/1980
- , CB-K17/1936
- , CB-K17/1871
- , CB-K17/1854
- , CB-K17/1842
- , CB-K17/1768
- , CB-K17/1747
- , CB-K17/1622
- , CB-K17/1558
- , CB-K17/1382
- , CB-K17/1197
- , CB-K17/1177
- , CB-K17/1023
- , DFN-CERT-2019-0358
- , DFN-CERT-2018-0077
- , DFN-CERT-2017-2104
- , DFN-CERT-2017-2070
- , DFN-CERT-2017-2021
- , DFN-CERT-2017-1954
- , DFN-CERT-2017-1926
- , DFN-CERT-2017-1925
- , DFN-CERT-2017-1843
- , DFN-CERT-2017-1828
- , DFN-CERT-2017-1692
- , DFN-CERT-2017-1626
- , DFN-CERT-2017-1443
- , DFN-CERT-2017-1240
- , DFN-CERT-2017-1217
- , DFN-CERT-2017-1058
- Issue
- -----
- NVT: 1.3.6.1.4.1.25623.1.0.141966
- OID: 1.3.6.1.4.1.25623.1.0.141966
- Threat: Medium
- Port: general/tcp
- Vulnerability Detection Result:
- Installed version: 2.4.25
- Fixed version: 2.4.38
- Log Method:
- Details:
- 1.3.6.1.4.1.25623.1.0.141966
- (OID: 1.3.6.1.4.1.25623.1.0.141966)
- Version used: $Revision: 13547 $
- References:
- CERT: CB-K19/0316
- , CB-K19/0071
- , DFN-CERT-2019-0781
- , DFN-CERT-2019-0687
- , DFN-CERT-2019-0529
- , DFN-CERT-2019-0184
- Issue
- -----
- NVT: 1.3.6.1.4.1.25623.1.0.141964
- OID: 1.3.6.1.4.1.25623.1.0.141964
- Threat: Medium
- Port: general/tcp
- Vulnerability Detection Result:
- Installed version: 2.4.25
- Fixed version: 2.4.38
- Log Method:
- Details:
- 1.3.6.1.4.1.25623.1.0.141964
- (OID: 1.3.6.1.4.1.25623.1.0.141964)
- Version used: $Revision: 13750 $
- References:
- CERT: CB-K19/0316
- , CB-K19/0071
- , DFN-CERT-2019-0690
- , DFN-CERT-2019-0687
- , DFN-CERT-2019-0198
- , DFN-CERT-2019-0184
- Issue
- -----
- NVT: 1.3.6.1.4.1.25623.1.0.142226
- OID: 1.3.6.1.4.1.25623.1.0.142226
- Threat: Medium
- Port: general/tcp
- Vulnerability Detection Result:
- Installed version: 2.4.25
- Fixed version: 2.4.39
- Log Method:
- Details:
- 1.3.6.1.4.1.25623.1.0.142226
- (OID: 1.3.6.1.4.1.25623.1.0.142226)
- Version used: 2019-04-08T15:50:06+0000
- References:
- CERT: CB-K19/0267
- , DFN-CERT-2019-0687
- , DFN-CERT-2019-0676
- Issue
- -----
- NVT: 1.3.6.1.4.1.25623.1.0.812849
- OID: 1.3.6.1.4.1.25623.1.0.812849
- Threat: Medium
- Port: 80/tcp
- Vulnerability Detection Result:
- Installed version: 2.4.25
- Fixed version: 2.4.30
- Installation
- path / port: 80/tcp
- Log Method:
- Details:
- 1.3.6.1.4.1.25623.1.0.812849
- (OID: 1.3.6.1.4.1.25623.1.0.812849)
- Version used: $Revision: 12116 $
- References:
- CERT: CB-K18/0535
- , DFN-CERT-2019-0359
- , DFN-CERT-2019-0351
- , DFN-CERT-2018-2316
- , DFN-CERT-2018-0985
- , DFN-CERT-2018-0570
- Issue
- -----
- NVT: 1.3.6.1.4.1.25623.1.0.811214
- OID: 1.3.6.1.4.1.25623.1.0.811214
- Threat: High
- Port: 80/tcp
- Vulnerability Detection Result:
- Installed version: 2.4.25
- Fixed version: 2.4.26
- Log Method:
- Details:
- 1.3.6.1.4.1.25623.1.0.811214
- (OID: 1.3.6.1.4.1.25623.1.0.811214)
- Version used: $Revision: 11863 $
- References:
- CERT: CB-K18/0066
- , CB-K17/2188
- , CB-K17/2013
- , CB-K17/1936
- , CB-K17/1854
- , CB-K17/1842
- , CB-K17/1768
- , CB-K17/1747
- , CB-K17/1622
- , CB-K17/1382
- , CB-K17/1279
- , CB-K17/1154
- , CB-K17/1023
- , DFN-CERT-2019-0358
- , DFN-CERT-2018-0077
- , DFN-CERT-2017-2290
- , DFN-CERT-2017-2104
- , DFN-CERT-2017-2021
- , DFN-CERT-2017-1926
- , DFN-CERT-2017-1925
- , DFN-CERT-2017-1843
- , DFN-CERT-2017-1828
- , DFN-CERT-2017-1692
- , DFN-CERT-2017-1443
- , DFN-CERT-2017-1327
- , DFN-CERT-2017-1193
- , DFN-CERT-2017-1058
- Issue
- -----
- NVT: 1.3.6.1.4.1.25623.1.0.108252
- OID: 1.3.6.1.4.1.25623.1.0.108252
- Threat: Medium
- Port: 80/tcp
- Vulnerability Detection Result:
- Installed version: 2.4.25
- Fixed version: 2.4.28
- Log Method:
- Details:
- 1.3.6.1.4.1.25623.1.0.108252
- (OID: 1.3.6.1.4.1.25623.1.0.108252)
- Version used: $Revision: 11983 $
- References:
- CERT: CB-K18/1012
- , CB-K18/0800
- , CB-K18/0606
- , CB-K18/0098
- , CB-K18/0066
- , CB-K17/2188
- , CB-K17/2117
- , CB-K17/2021
- , CB-K17/1980
- , CB-K17/1936
- , CB-K17/1871
- , CB-K17/1773
- , CB-K17/1768
- , CB-K17/1587
- , DFN-CERT-2019-0359
- , DFN-CERT-2018-2113
- , DFN-CERT-2018-1070
- , DFN-CERT-2018-0725
- , DFN-CERT-2018-0100
- , DFN-CERT-2018-0077
- , DFN-CERT-2017-2290
- , DFN-CERT-2017-2211
- , DFN-CERT-2017-2108
- , DFN-CERT-2017-2070
- , DFN-CERT-2017-2021
- , DFN-CERT-2017-1954
- , DFN-CERT-2017-1854
- , DFN-CERT-2017-1843
- , DFN-CERT-2017-1659
- Issue
- -----
- NVT: 1.3.6.1.4.1.25623.1.0.900498
- OID: 1.3.6.1.4.1.25623.1.0.900498
- Threat: Log
- Port: 80/tcp
- Vulnerability Detection Result:
- Detected Apache
- Version: 2.4.25
- Location: 80/tcp
- CPE: cpe:/a:apache:http_server:2.4.25
- Concluded from version/product identification result:
- Server: Apache/2.4.25
- Log Method:
- Details:
- 1.3.6.1.4.1.25623.1.0.900498
- (OID: 1.3.6.1.4.1.25623.1.0.900498)
- Version used: $Revision: 10290 $
- Issue
- -----
- NVT: 1.3.6.1.4.1.25623.1.0.111038
- OID: 1.3.6.1.4.1.25623.1.0.111038
- Threat: Log
- Port: 80/tcp
- Vulnerability Detection Result:
- The Hostname/IP "li574-217.members.linode.com" was used to access the remote hos!
- t.
- Generic web application scanning is disabled for this host via the "Enable gener!
- ic web application scanning" option within the "Global variable settings" of the!
- scan config in use.
- Requests to this service are done via HTTP/1.1.
- This service seems to be able to host PHP scripts.
- This service seems to be NOT able to host ASP scripts.
- The User-Agent "Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" was used to access !
- the remote host.
- Historic /scripts and /cgi-bin are not added to the directories used for CGI sca!
- nning. You can enable this again with the "Add historic /scripts and /cgi-bin to!
- directories for CGI scanning" option within the "Global variable settings" of t!
- he scan config in use.
- A possible recursion was detected during CGI scanning:
- The service is using a relative URL in one or more HTML references where e.g. /f!
- ile1.html contains <a href="subdir/file2.html"> and a subsequent request for sub!
- dir/file2.html is linking to subdir/file2.html. This would resolves to subdir/su!
- bdir/file2.html causing a recursion. To work around this counter-measures have b!
- een enabled but the service should be fixed as well to not use such problematic !
- links. Below an excerpt of URLs is shown to help identify those issues.
- Syntax : URL (HTML link)
- http://li574-217.members.linode.com/cgialfa/?D=A (alfa_shtml/)
- http://li574-217.members.linode.com/cgialfa/?D=A (cgialfa/)
- The following directories were used for CGI scanning:
- http://li574-217.members.linode.com/
- http://li574-217.members.linode.com/alfa_shtml
- http://li574-217.members.linode.com/alfacgiapi
- http://li574-217.members.linode.com/cgialfa
- http://li574-217.members.linode.com/cgialfa/alfa_shtml
- http://li574-217.members.linode.com/cgialfa/cgialfa
- http://li574-217.members.linode.com/cgialfa/config-sniper
- http://li574-217.members.linode.com/cgialfa/cpanels
- http://li574-217.members.linode.com/cgialfa/password_changer
- http://li574-217.members.linode.com/cgialfa/password_changer/whm_plugin
- While this is not, in and of itself, a bug, you should manually inspect these di!
- rectories to ensure that they are in compliance with company security standards
- The following directories were excluded from CGI scanning because the "Regex pat!
- tern to exclude directories from CGI scanning" setting of the NVT "Global variab!
- le settings" (OID: 1.3.6.1.4.1.25623.1.0.12288) for this scan was: "/(index\.php!
- |image|img|css|js$|js/|javascript|style|theme|icon|jquery|graphic|grafik|picture!
- |bilder|thumbnail|media/|skins?/)"
- http://li574-217.members.linode.com/icons
- Directory index found at:
- http://li574-217.members.linode.com/
- http://li574-217.members.linode.com/alfa_shtml/
- http://li574-217.members.linode.com/alfacgiapi/
- http://li574-217.members.linode.com/cgialfa/
- http://li574-217.members.linode.com/cgialfa/alfa_shtml/
- http://li574-217.members.linode.com/cgialfa/cgialfa/
- http://li574-217.members.linode.com/cgialfa/config-sniper/
- http://li574-217.members.linode.com/cgialfa/password_changer/whm_plugin/
- The following CGIs were discovered:
- Syntax : cginame (arguments [default value])
- http://li574-217.members.linode.com/ (C=S;O [A] C=N;O [D] C=M;O [A] C=D;O [A] )
- http://li574-217.members.linode.com/alfa_shtml/ (C=S;O [A] C=N;O [D] C=M;O [A] C!
- =D;O [A] )
- http://li574-217.members.linode.com/alfacgiapi/ (C=S;O [A] C=N;O [D] C=M;O [A] C!
- =D;O [A] )
- http://li574-217.members.linode.com/cgialfa/ (php_info [] host [] C=S;O [A] doma!
- ins [] time [] solevisible [] C=N;O [D] uploader [] C=M;O [A] act [phptools] C=D!
- ;O [A] mass_injector [] server_info [] file_manager [] die [] back_connecter [] !
- )
- http://li574-217.members.linode.com/cgialfa/alfa_shtml/ (C=S;O [A] C=N;O [D] C=M!
- ;O [A] C=D;O [A] )
- http://li574-217.members.linode.com/cgialfa/cgialfa/ (C=S;O [A] C=N;O [D] C=M;O !
- [A] C=D;O [A] )
- http://li574-217.members.linode.com/cgialfa/config-sniper/ (C=S;O [A] C=N;O [D] !
- C=M;O [A] C=D;O [A] )
- http://li574-217.members.linode.com/cgialfa/cpanels/ (C=S;O [A] C=N;O [D] C=M;O !
- [A] C=D;O [A] )
- http://li574-217.members.linode.com/cgialfa/ok.php (f[] [] a [dlfile] c [] file !
- [] )
- http://li574-217.members.linode.com/cgialfa/password_changer/ (C=S;O [A] C=N;O [!
- D] C=M;O [A] C=D;O [A] )
- http://li574-217.members.linode.com/cgialfa/password_changer/whm_plugin/ (C=S;O !
- [A] C=N;O [D] C=M;O [A] C=D;O [A] )
- Log Method:
- Details:
- 1.3.6.1.4.1.25623.1.0.111038
- (OID: 1.3.6.1.4.1.25623.1.0.111038)
- Version used: $Revision: 13679 $
- Issue
- -----
- NVT: 1.3.6.1.4.1.25623.1.0.10919
- OID: 1.3.6.1.4.1.25623.1.0.10919
- Threat: Log
- Port: 22/tcp
- Vulnerability Detection Result:
- This port was detected as being open by a port scanner but is now closed.
- This service might have been crashed by a port scanner or by a plugin
- Log Method:
- Details:
- 1.3.6.1.4.1.25623.1.0.10919
- (OID: 1.3.6.1.4.1.25623.1.0.10919)
- Version used: $Revision: 13783 $
- Issue
- -----
- NVT: 1.3.6.1.4.1.25623.1.0.810002
- OID: 1.3.6.1.4.1.25623.1.0.810002
- Threat: Log
- Port: general/CPE-T
- Vulnerability Detection Result:
- 151.236.219.217|cpe:/a:apache:http_server:2.4.25
- 151.236.219.217|cpe:/a:openbsd:openssh:7.4p1
- 151.236.219.217|cpe:/a:php:php
- 151.236.219.217|cpe:/o:debian:debian_linux:9
- Log Method:
- Details:
- 1.3.6.1.4.1.25623.1.0.810002
- (OID: 1.3.6.1.4.1.25623.1.0.810002)
- Version used: $Revision: 14324 $
- Issue
- -----
- NVT: 1.3.6.1.4.1.25623.1.0.103079
- OID: 1.3.6.1.4.1.25623.1.0.103079
- Threat: Log
- Port: 80/tcp
- Vulnerability Detection Result:
- This are the directories/files found with brute force:
- http://li574
- Log Method:
- Details:
- 1.3.6.1.4.1.25623.1.0.103079
- (OID: 1.3.6.1.4.1.25623.1.0.103079)
- Version used: $Revision: 13985 $
- Issue
- -----
- NVT: 1.3.6.1.4.1.25623.1.0.112081
- OID: 1.3.6.1.4.1.25623.1.0.112081
- Threat: Log
- Port: 80/tcp
- Vulnerability Detection Result:
- Missing Headers
- ---------------
- Content-Security-Policy
- Referrer-Policy
- X-Content-Type-Options
- X-Frame-Options
- X-Permitted-Cross-Domain-Policies
- X-XSS-Protection
- Log Method:
- Details:
- 1.3.6.1.4.1.25623.1.0.112081
- (OID: 1.3.6.1.4.1.25623.1.0.112081)
- Version used: $Revision: 10899 $
- Issue
- -----
- NVT: 1.3.6.1.4.1.25623.1.0.10107
- OID: 1.3.6.1.4.1.25623.1.0.10107
- Threat: Log
- Port: 80/tcp
- Vulnerability Detection Result:
- The remote web server type is :
- Apache/2.4.25 (Debian)
- Solution : You can set the directive "ServerTokens Prod" to limit
- the information emanating from the server in its response headers.
- Log Method:
- Details:
- 1.3.6.1.4.1.25623.1.0.10107
- (OID: 1.3.6.1.4.1.25623.1.0.10107)
- Version used: $Revision: 11585 $
- Issue
- -----
- NVT: 1.3.6.1.4.1.25623.1.0.812051
- OID: 1.3.6.1.4.1.25623.1.0.812051
- Threat: Medium
- Port: 22/tcp
- Vulnerability Detection Result:
- Installed version: 7.4p1
- Fixed version: 7.6
- Log Method:
- Details:
- 1.3.6.1.4.1.25623.1.0.812051
- (OID: 1.3.6.1.4.1.25623.1.0.812051)
- Version used: $Revision: 11983 $
- References:
- CERT: CB-K18/0137
- , CB-K17/2126
- , CB-K17/2014
- , CB-K17/2002
- , DFN-CERT-2019-0362
- , DFN-CERT-2018-2554
- , DFN-CERT-2018-2191
- , DFN-CERT-2018-2068
- , DFN-CERT-2018-1828
- , DFN-CERT-2018-1568
- , DFN-CERT-2018-0150
- , DFN-CERT-2017-2217
- , DFN-CERT-2017-2100
- , DFN-CERT-2017-2093
- Issue
- -----
- NVT: 1.3.6.1.4.1.25623.1.0.813864
- OID: 1.3.6.1.4.1.25623.1.0.813864
- Threat: Medium
- Port: 22/tcp
- Vulnerability Detection Result:
- Installed version: 7.4p1
- Fixed version: 7.8
- Installation
- path / port: 22/tcp
- Log Method:
- Details:
- 1.3.6.1.4.1.25623.1.0.813864
- (OID: 1.3.6.1.4.1.25623.1.0.813864)
- Version used: $Revision: 12956 $
- References:
- CERT: CB-K18/1031
- , CB-K18/0873
- , DFN-CERT-2019-0362
- , DFN-CERT-2018-2293
- , DFN-CERT-2018-2259
- , DFN-CERT-2018-2191
- , DFN-CERT-2018-1806
- , DFN-CERT-2018-1696
- Issue
- -----
- NVT: 1.3.6.1.4.1.25623.1.0.105937
- OID: 1.3.6.1.4.1.25623.1.0.105937
- Threat: Log
- Port: general/tcp
- Vulnerability Detection Result:
- Best matching OS:
- OS: Debian GNU/Linux 9
- Version: 9
- CPE: cpe:/o:debian:debian_linux:9
- Found by NVT: 1.3.6.1.4.1.25623.1.0.105586 (SSH OS Identification)
- Concluded from SSH banner on port 22/tcp: SSH-2.0-OpenSSH_7.4p1 Debian-10+deb9u6
- Setting key "Host/runs_unixoide" based on this information
- Other OS detections (in order of reliability):
- OS: Debian GNU/Linux 9
- Version: 9
- CPE: cpe:/o:debian:debian_linux:9
- Found by NVT: 1.3.6.1.4.1.25623.1.0.111067 (HTTP OS Identification)
- Concluded from HTTP Server banner on port 80/tcp: Server: Apache/2.4.25 (Debian)
- Log Method:
- Details:
- 1.3.6.1.4.1.25623.1.0.105937
- (OID: 1.3.6.1.4.1.25623.1.0.105937)
- Version used: 2019-04-25T09:49:09+0000
- Issue
- -----
- NVT: 1.3.6.1.4.1.25623.1.0.800109
- OID: 1.3.6.1.4.1.25623.1.0.800109
- Threat: Log
- Port: 80/tcp
- Vulnerability Detection Result:
- Detected PHP
- Version: unknown
- Location: 80/tcp
- CPE: cpe:/a:php:php
- Concluded from version/product identification result:
- PHPSESSID Session-Cookie
- Log Method:
- Details:
- 1.3.6.1.4.1.25623.1.0.800109
- (OID: 1.3.6.1.4.1.25623.1.0.800109)
- Version used: $Revision: 13811 $
- Issue
- -----
- NVT: 1.3.6.1.4.1.25623.1.0.11153
- OID: 1.3.6.1.4.1.25623.1.0.11153
- Threat: Log
- Port: 22/tcp
- Vulnerability Detection Result:
- A SSH server seems to be running on this port
- Log Method:
- Details:
- 1.3.6.1.4.1.25623.1.0.11153
- (OID: 1.3.6.1.4.1.25623.1.0.11153)
- Version used: $Revision: 14067 $
- Issue
- -----
- NVT: 1.3.6.1.4.1.25623.1.0.10330
- OID: 1.3.6.1.4.1.25623.1.0.10330
- Threat: Log
- Port: 80/tcp
- Vulnerability Detection Result:
- A web server is running on this port
- Log Method:
- Details:
- 1.3.6.1.4.1.25623.1.0.10330
- (OID: 1.3.6.1.4.1.25623.1.0.10330)
- Version used: $Revision: 13541 $
- Issue
- -----
- NVT: 1.3.6.1.4.1.25623.1.0.10330
- OID: 1.3.6.1.4.1.25623.1.0.10330
- Threat: Log
- Port: 22/tcp
- Vulnerability Detection Result:
- An unknown service is running on this port.
- It is usually reserved for SSH
- Log Method:
- Details:
- 1.3.6.1.4.1.25623.1.0.10330
- (OID: 1.3.6.1.4.1.25623.1.0.10330)
- Version used: $Revision: 13541 $
- Issue
- -----
- NVT: 1.3.6.1.4.1.25623.1.0.10330
- OID: 1.3.6.1.4.1.25623.1.0.10330
- Threat: Log
- Port: 21/tcp
- Vulnerability Detection Result:
- An unknown service is running on this port.
- It is usually reserved for FTP
- Log Method:
- Details:
- 1.3.6.1.4.1.25623.1.0.10330
- (OID: 1.3.6.1.4.1.25623.1.0.10330)
- Version used: $Revision: 13541 $
- Issue
- -----
- NVT: 1.3.6.1.4.1.25623.1.0.105565
- OID: 1.3.6.1.4.1.25623.1.0.105565
- Threat: Log
- Port: 22/tcp
- Vulnerability Detection Result:
- The following options are supported by the remote ssh service:
- kex_algorithms:
- curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nist!
- p384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-grou!
- p16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-he!
- llman-group14-sha1
- server_host_key_algorithms:
- ssh-rsa,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519
- encryption_algorithms_client_to_server:
- chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openss!
- h.com,aes256-gcm@openssh.com
- encryption_algorithms_server_to_client:
- chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openss!
- h.com,aes256-gcm@openssh.com
- mac_algorithms_client_to_server:
- umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,h!
- mac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-!
- 128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
- mac_algorithms_server_to_client:
- umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,h!
- mac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-!
- 128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
- compression_algorithms_client_to_server:
- none,zlib@openssh.com
- compression_algorithms_server_to_client:
- none,zlib@openssh.com
- Log Method:
- Details:
- 1.3.6.1.4.1.25623.1.0.105565
- (OID: 1.3.6.1.4.1.25623.1.0.105565)
- Version used: $Revision: 13581 $
- Issue
- -----
- NVT: 1.3.6.1.4.1.25623.1.0.100259
- OID: 1.3.6.1.4.1.25623.1.0.100259
- Threat: Log
- Port: 22/tcp
- Vulnerability Detection Result:
- The remote SSH Server supports the following SSH Protocol Versions:
- 1.99
- 2.0
- SSHv2 Fingerprint(s):
- ecdsa-sha2-nistp256: 0f:5f:a2:92:df:6e:19:2a:c0:e1:2a:ce:03:bb:b7:90
- ssh-ed25519: 41:1c:f0:e4:57:48:86:50:28:46:6e:ae:12:25:b4:d2
- ssh-rsa: 7c:ef:29:6a:03:1b:c3:ec:82:0e:e6:4b:6a:db:6e:eb
- Log Method:
- Details:
- 1.3.6.1.4.1.25623.1.0.100259
- (OID: 1.3.6.1.4.1.25623.1.0.100259)
- Version used: $Revision: 13594 $
- Issue
- -----
- NVT: 1.3.6.1.4.1.25623.1.0.10267
- OID: 1.3.6.1.4.1.25623.1.0.10267
- Threat: Log
- Port: 22/tcp
- Vulnerability Detection Result:
- Remote SSH server banner: SSH-2.0-OpenSSH_7.4p1 Debian-10+deb9u6
- Remote SSH supported authentication: password,publickey
- Remote SSH text/login banner: (not available)
- This is probably:
- - OpenSSH
- CPE: cpe:/a:openbsd:openssh:7.4p1
- Concluded from remote connection attempt with credentials:
- Login: OpenVAS-VT
- Password: OpenVAS-VT
- Log Method:
- Details:
- 1.3.6.1.4.1.25623.1.0.10267
- (OID: 1.3.6.1.4.1.25623.1.0.10267)
- Version used: 2019-03-22T07:02:59+0000
- Issue
- -----
- NVT: 1.3.6.1.4.1.25623.1.0.902815
- OID: 1.3.6.1.4.1.25623.1.0.902815
- Threat: Medium
- Port: general/tcp
- Vulnerability Detection Result:
- Vulnerability was detected according to the Vulnerability Detection Method.
- Log Method:
- Details:
- 1.3.6.1.4.1.25623.1.0.902815
- (OID: 1.3.6.1.4.1.25623.1.0.902815)
- Version used: $Revision: 11066 $
- References:
- CERT: CB-K17/0697
- , CB-K17/0297
- , CB-K17/0238
- , CB-K17/0168
- , CB-K15/0080
- , CB-K14/1162
- , CB-K14/0852
- , DFN-CERT-2017-0719
- , DFN-CERT-2017-0305
- , DFN-CERT-2017-0249
- , DFN-CERT-2017-0171
- , DFN-CERT-2015-0082
- , DFN-CERT-2014-1217
- , DFN-CERT-2014-0890
- Issue
- -----
- NVT: 1.3.6.1.4.1.25623.1.0.51662
- OID: 1.3.6.1.4.1.25623.1.0.51662
- Threat: Log
- Port: general/tcp
- Vulnerability Detection Result:
- Here is the route from 192.168.132.128 to 151.236.219.217:
- 192.168.132.128
- 151.236.219.217
- Log Method:
- Details:
- 1.3.6.1.4.1.25623.1.0.51662
- (OID: 1.3.6.1.4.1.25623.1.0.51662)
- Version used: $Revision: 10411 $
- Issue
- -----
- NVT: 1.3.6.1.4.1.25623.1.0.80110
- OID: 1.3.6.1.4.1.25623.1.0.80110
- Threat: Log
- Port: 80/tcp
- Vulnerability Detection Result:
- The wapiti report filename is empty. That could mean that a wrong version of wap!
- iti is used or tmp dir is not accessible. Make sure to have wapiti 2.x as wapiti!
- 1.x is not supported.
- In short: Check the installation of wapiti and the scanner.
- Log Method:
- Details:
- 1.3.6.1.4.1.25623.1.0.80110
- (OID: 1.3.6.1.4.1.25623.1.0.80110)
- Version used: $Revision: 13985 $
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement