Help needed to fix security issues discovered using Nikto on Ubuntu server 12.10












2















What can be done to mitigate theses security issues found by Nikto on all our Ubuntu servers version 12.10?




  1. OSVDB-2799: /cgi-915/dose.pl?daily&somefile.txt&|ls|: DailyDose 1.1 is vulnerable to a directory traversal attack in the 'list' parameter.


  2. OSVDB-3233: /icons/README: Apache default file found.


  3. /modules.php?op=modload&name=FAQ&file=index&myfaq=yes&id_cat=1&categories=%3Cimg%20src=javascript:alert(9456);%3E&parent_id=0: Post Nuke 0.7.2.3-Phoenix is vulnerable to Cross Site Scripting (XSS). cert.org/advisories/CA-2000-02.html.



  4. This one is looking weird to me, since we do not use Web Wiz Forum script (can i assume this is just a false positive???!!!!???) :




    • OSVDB-4598: /members.asp?SF=%22;}alert('Vulnerable');function%20x(){v%20=%22: Web Wiz Forums ver. 7.01 and below is vulnerable to Cross Site Scripting (XSS). cert.org/advisories/CA-2000-02.html.



  5. OSVDB-27071: /phpimageview.php?pic=javascript:alert(8754): PHP Image View 1.0 is vulnerable to Cross Site Scripting (XSS). cert.org/advisories/CA-2000-02.html.



Thank you!










share|improve this question
















bumped to the homepage by Community 4 mins ago


This question has answers that may be good or bad; the system has marked it active so that they can be reviewed.




















    2















    What can be done to mitigate theses security issues found by Nikto on all our Ubuntu servers version 12.10?




    1. OSVDB-2799: /cgi-915/dose.pl?daily&somefile.txt&|ls|: DailyDose 1.1 is vulnerable to a directory traversal attack in the 'list' parameter.


    2. OSVDB-3233: /icons/README: Apache default file found.


    3. /modules.php?op=modload&name=FAQ&file=index&myfaq=yes&id_cat=1&categories=%3Cimg%20src=javascript:alert(9456);%3E&parent_id=0: Post Nuke 0.7.2.3-Phoenix is vulnerable to Cross Site Scripting (XSS). cert.org/advisories/CA-2000-02.html.



    4. This one is looking weird to me, since we do not use Web Wiz Forum script (can i assume this is just a false positive???!!!!???) :




      • OSVDB-4598: /members.asp?SF=%22;}alert('Vulnerable');function%20x(){v%20=%22: Web Wiz Forums ver. 7.01 and below is vulnerable to Cross Site Scripting (XSS). cert.org/advisories/CA-2000-02.html.



    5. OSVDB-27071: /phpimageview.php?pic=javascript:alert(8754): PHP Image View 1.0 is vulnerable to Cross Site Scripting (XSS). cert.org/advisories/CA-2000-02.html.



    Thank you!










    share|improve this question
















    bumped to the homepage by Community 4 mins ago


    This question has answers that may be good or bad; the system has marked it active so that they can be reviewed.


















      2












      2








      2


      1






      What can be done to mitigate theses security issues found by Nikto on all our Ubuntu servers version 12.10?




      1. OSVDB-2799: /cgi-915/dose.pl?daily&somefile.txt&|ls|: DailyDose 1.1 is vulnerable to a directory traversal attack in the 'list' parameter.


      2. OSVDB-3233: /icons/README: Apache default file found.


      3. /modules.php?op=modload&name=FAQ&file=index&myfaq=yes&id_cat=1&categories=%3Cimg%20src=javascript:alert(9456);%3E&parent_id=0: Post Nuke 0.7.2.3-Phoenix is vulnerable to Cross Site Scripting (XSS). cert.org/advisories/CA-2000-02.html.



      4. This one is looking weird to me, since we do not use Web Wiz Forum script (can i assume this is just a false positive???!!!!???) :




        • OSVDB-4598: /members.asp?SF=%22;}alert('Vulnerable');function%20x(){v%20=%22: Web Wiz Forums ver. 7.01 and below is vulnerable to Cross Site Scripting (XSS). cert.org/advisories/CA-2000-02.html.



      5. OSVDB-27071: /phpimageview.php?pic=javascript:alert(8754): PHP Image View 1.0 is vulnerable to Cross Site Scripting (XSS). cert.org/advisories/CA-2000-02.html.



      Thank you!










      share|improve this question
















      What can be done to mitigate theses security issues found by Nikto on all our Ubuntu servers version 12.10?




      1. OSVDB-2799: /cgi-915/dose.pl?daily&somefile.txt&|ls|: DailyDose 1.1 is vulnerable to a directory traversal attack in the 'list' parameter.


      2. OSVDB-3233: /icons/README: Apache default file found.


      3. /modules.php?op=modload&name=FAQ&file=index&myfaq=yes&id_cat=1&categories=%3Cimg%20src=javascript:alert(9456);%3E&parent_id=0: Post Nuke 0.7.2.3-Phoenix is vulnerable to Cross Site Scripting (XSS). cert.org/advisories/CA-2000-02.html.



      4. This one is looking weird to me, since we do not use Web Wiz Forum script (can i assume this is just a false positive???!!!!???) :




        • OSVDB-4598: /members.asp?SF=%22;}alert('Vulnerable');function%20x(){v%20=%22: Web Wiz Forums ver. 7.01 and below is vulnerable to Cross Site Scripting (XSS). cert.org/advisories/CA-2000-02.html.



      5. OSVDB-27071: /phpimageview.php?pic=javascript:alert(8754): PHP Image View 1.0 is vulnerable to Cross Site Scripting (XSS). cert.org/advisories/CA-2000-02.html.



      Thank you!







      security apache2 webserver






      share|improve this question















      share|improve this question













      share|improve this question




      share|improve this question








      edited Mar 26 '13 at 23:37









      Ahmadgeo

      1,1671926




      1,1671926










      asked Mar 26 '13 at 22:16









      MartinMartin

      2625




      2625





      bumped to the homepage by Community 4 mins ago


      This question has answers that may be good or bad; the system has marked it active so that they can be reviewed.







      bumped to the homepage by Community 4 mins ago


      This question has answers that may be good or bad; the system has marked it active so that they can be reviewed.
























          1 Answer
          1






          active

          oldest

          votes


















          0














          By definition, Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6500 potentially dangerous files/CGIs, checks for outdated versions of over 1250 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software. Scan items and plugins are frequently updated and can be automatically updated.



          So, your issue(s) here are in your Webserver (Apache)



          But since I won't be able to give you a detailed answer as I'm not a specialist :)



          here are some guidlines:



          1- make sure your server is having the latest security updates and latest Apache Server version as later versions tend to fix all identified vulnerabilities.



          2- Run Nikto after the update and check if some/all identified issues have been resolved



          3- Check this link for details on Cross Site Scripting for all related detections http://en.wikipedia.org/wiki/Cross-site_scripting



          4- for issue #1 and #2, refer to the official Apache SecurityTips via http://httpd.apache.org/docs/2.2/misc/security_tips.html



          5- Run Nikto again and periodically every while and after.



          You may find other helpful articles if you googled on Securing Apache Server but I prefer official documentations myself



          Hope this helps you solve your issues.






          share|improve this answer























            Your Answer








            StackExchange.ready(function() {
            var channelOptions = {
            tags: "".split(" "),
            id: "89"
            };
            initTagRenderer("".split(" "), "".split(" "), channelOptions);

            StackExchange.using("externalEditor", function() {
            // Have to fire editor after snippets, if snippets enabled
            if (StackExchange.settings.snippets.snippetsEnabled) {
            StackExchange.using("snippets", function() {
            createEditor();
            });
            }
            else {
            createEditor();
            }
            });

            function createEditor() {
            StackExchange.prepareEditor({
            heartbeatType: 'answer',
            autoActivateHeartbeat: false,
            convertImagesToLinks: true,
            noModals: true,
            showLowRepImageUploadWarning: true,
            reputationToPostImages: 10,
            bindNavPrevention: true,
            postfix: "",
            imageUploader: {
            brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
            contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
            allowUrls: true
            },
            onDemand: true,
            discardSelector: ".discard-answer"
            ,immediatelyShowMarkdownHelp:true
            });


            }
            });














            draft saved

            draft discarded


















            StackExchange.ready(
            function () {
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f272829%2fhelp-needed-to-fix-security-issues-discovered-using-nikto-on-ubuntu-server-12-10%23new-answer', 'question_page');
            }
            );

            Post as a guest















            Required, but never shown

























            1 Answer
            1






            active

            oldest

            votes








            1 Answer
            1






            active

            oldest

            votes









            active

            oldest

            votes






            active

            oldest

            votes









            0














            By definition, Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6500 potentially dangerous files/CGIs, checks for outdated versions of over 1250 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software. Scan items and plugins are frequently updated and can be automatically updated.



            So, your issue(s) here are in your Webserver (Apache)



            But since I won't be able to give you a detailed answer as I'm not a specialist :)



            here are some guidlines:



            1- make sure your server is having the latest security updates and latest Apache Server version as later versions tend to fix all identified vulnerabilities.



            2- Run Nikto after the update and check if some/all identified issues have been resolved



            3- Check this link for details on Cross Site Scripting for all related detections http://en.wikipedia.org/wiki/Cross-site_scripting



            4- for issue #1 and #2, refer to the official Apache SecurityTips via http://httpd.apache.org/docs/2.2/misc/security_tips.html



            5- Run Nikto again and periodically every while and after.



            You may find other helpful articles if you googled on Securing Apache Server but I prefer official documentations myself



            Hope this helps you solve your issues.






            share|improve this answer




























              0














              By definition, Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6500 potentially dangerous files/CGIs, checks for outdated versions of over 1250 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software. Scan items and plugins are frequently updated and can be automatically updated.



              So, your issue(s) here are in your Webserver (Apache)



              But since I won't be able to give you a detailed answer as I'm not a specialist :)



              here are some guidlines:



              1- make sure your server is having the latest security updates and latest Apache Server version as later versions tend to fix all identified vulnerabilities.



              2- Run Nikto after the update and check if some/all identified issues have been resolved



              3- Check this link for details on Cross Site Scripting for all related detections http://en.wikipedia.org/wiki/Cross-site_scripting



              4- for issue #1 and #2, refer to the official Apache SecurityTips via http://httpd.apache.org/docs/2.2/misc/security_tips.html



              5- Run Nikto again and periodically every while and after.



              You may find other helpful articles if you googled on Securing Apache Server but I prefer official documentations myself



              Hope this helps you solve your issues.






              share|improve this answer


























                0












                0








                0







                By definition, Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6500 potentially dangerous files/CGIs, checks for outdated versions of over 1250 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software. Scan items and plugins are frequently updated and can be automatically updated.



                So, your issue(s) here are in your Webserver (Apache)



                But since I won't be able to give you a detailed answer as I'm not a specialist :)



                here are some guidlines:



                1- make sure your server is having the latest security updates and latest Apache Server version as later versions tend to fix all identified vulnerabilities.



                2- Run Nikto after the update and check if some/all identified issues have been resolved



                3- Check this link for details on Cross Site Scripting for all related detections http://en.wikipedia.org/wiki/Cross-site_scripting



                4- for issue #1 and #2, refer to the official Apache SecurityTips via http://httpd.apache.org/docs/2.2/misc/security_tips.html



                5- Run Nikto again and periodically every while and after.



                You may find other helpful articles if you googled on Securing Apache Server but I prefer official documentations myself



                Hope this helps you solve your issues.






                share|improve this answer













                By definition, Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6500 potentially dangerous files/CGIs, checks for outdated versions of over 1250 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software. Scan items and plugins are frequently updated and can be automatically updated.



                So, your issue(s) here are in your Webserver (Apache)



                But since I won't be able to give you a detailed answer as I'm not a specialist :)



                here are some guidlines:



                1- make sure your server is having the latest security updates and latest Apache Server version as later versions tend to fix all identified vulnerabilities.



                2- Run Nikto after the update and check if some/all identified issues have been resolved



                3- Check this link for details on Cross Site Scripting for all related detections http://en.wikipedia.org/wiki/Cross-site_scripting



                4- for issue #1 and #2, refer to the official Apache SecurityTips via http://httpd.apache.org/docs/2.2/misc/security_tips.html



                5- Run Nikto again and periodically every while and after.



                You may find other helpful articles if you googled on Securing Apache Server but I prefer official documentations myself



                Hope this helps you solve your issues.







                share|improve this answer












                share|improve this answer



                share|improve this answer










                answered Mar 26 '13 at 23:31









                AhmadgeoAhmadgeo

                1,1671926




                1,1671926






























                    draft saved

                    draft discarded




















































                    Thanks for contributing an answer to Ask Ubuntu!


                    • Please be sure to answer the question. Provide details and share your research!

                    But avoid



                    • Asking for help, clarification, or responding to other answers.

                    • Making statements based on opinion; back them up with references or personal experience.


                    To learn more, see our tips on writing great answers.




                    draft saved


                    draft discarded














                    StackExchange.ready(
                    function () {
                    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f272829%2fhelp-needed-to-fix-security-issues-discovered-using-nikto-on-ubuntu-server-12-10%23new-answer', 'question_page');
                    }
                    );

                    Post as a guest















                    Required, but never shown





















































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown

































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown







                    Popular posts from this blog

                    GameSpot

                    connect to host localhost port 22: Connection refused

                    Getting a Wifi WPA2 wifi connection