Remote Vulnerabilities | 137




Download 22,59 Mb.
Pdf ko'rish
bet130/225
Sana14.05.2024
Hajmi22,59 Mb.
#232856
1   ...   126   127   128   129   130   131   132   133   ...   225
Bog'liq
learningkalilinux

Remote Vulnerabilities | 137


Each finding will tell you how the vulnerability was detected. In this case, OpenVAS
found a Ruby-based web page and sent it a request, attempting to make a system call.
The error message that resulted suggested to OpenVAS that these system calls are
allowed through the application. Since system calls are used for important functions
like reading and writing files, gaining access to hardware and other important func‐
tions, these calls could potentially provide access to the attacker or cause damage to
files on the system. It’s because of that potential level of access that the severity was
rated so high.
When you get a result like this, it’s worth trying as best as you can to duplicate it
manually. This is where you may want to turn up the logging as high as you can. This
can be done by going to the scanner preferences and turning on Log Whole Attack.
You can also check the application log from the target application to see exactly what
was done. Repeating the attack and then modifying it in useful ways can be impor‐
tant. For example, manual testing of the vulnerability identified in 
Figure 4-14
resul‐
ted in an error message indicating that the function was not implemented. What
OpenVAS tried wasn’t completely successful, so additional testing and research is
needed.
If you need help performing the additional testing, the findings will have a list of
resources. These web pages will have more details on the vulnerability, which can
help you understand the attack so you can work on duplicating it. Often, these
resources point to the announcement of the vulnerability. They may also provide
details from vendors about fixes or workarounds.
Another column to take a look at is the second column, which is labeled with just an
icon. This is the column indicating the solution type. The solutions may include
workarounds, vendor fixes, or mitigations. Each finding will provide additional
details about the workarounds or fixes that may be possible. One of the vulnerabilities
that was detected was features of an SMTP server that could lead an attacker to infor‐
mation about email addresses. 
Figure 4-15
shows one of the findings and its solution.
This particular solution is a workaround. In this case, the workaround is to disable
the two functions in the mail server.
Figure 4-15. OpenVAS solution

Download 22,59 Mb.
1   ...   126   127   128   129   130   131   132   133   ...   225




Download 22,59 Mb.
Pdf ko'rish