|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> CGI abuses >> PatchLink Update Server proxyreg.asp Authentication Bypass Vulnerability Vulnerability Assessment Details
|
PatchLink Update Server proxyreg.asp Authentication Bypass Vulnerability |
||
Tries to list registered proxy server in PatchLink Update Server Detailed Explanation for this Vulnerability Assessment Summary : The remote web server contains an ASP script that is prone to an authentication bypass attack. Description : The remote host is running PatchLink Update Server, a patch and vulnerability management solution. The version of PatchLink Update Server installed on the remote fails to check for authentication credentials before providing access to the '/dagent/proxyreg.asp' script. A possible hacker can exploit this issue to list, delete, or add proxies used by the PatchLink FastPatch software. Note that Novell ZENworks Patch Management is based on PatchLink Update Server and is affected as well. See also : http://www.securityfocus.com/archive/1/438710/30/0/threaded http://support.novell.com/cgi-bin/search/searchtid.cgi?10100709.htm Solution : Apply patch 6.1 P1 / 6.2 SR1 P1 if using PatchLink Update Server or 6.2 SR1 P1 if using Novell ZENworks Patch Management. Network Security Threat Level: High / CVSS Base Score : 7 (AV:R/AC:L/Au:NR/C:P/A:P/I:P/B:N) Networks Security ID: 18723 Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security |
||
Cables, Connectors |
Supermicro 4U 36 Bay Storage Server 2.4Ghz 8-C 128GB 1x1280W Rails TrueNAS ZFS
$712.98
CSE-118 Supermicro 1U 3x GPU Server 2.6Ghz 20-C 128GB CX353A 2x1600W PSU Rails
$454.03
Dell PowerEdge R630 8SFF 2.6Ghz 20-Core 128GB Mem 2x10G+2x1G NIC 2x750W PSU
$399.04
Intel XEON E5-2699 V3 CPU PROCESSOR 18 CORE 2.30GHZ 45MB L3 CACHE 145W SR1XD
$45.00
Intel SR2JT Xeon E5-2683 v4 2.10GHz 16-Core CPU Processor
$21.96
Intel Xeon E5-2680 v4 2.4GHz 35MB 14-Core 120W LGA2011-3 SR2N7
$17.99
Intel Xeon E5-2697A V4 2.6GHz CPU Processor 16-Core Socket LGA2011 SR2K1
$39.99
Intel Xeon Gold 6140 SR3AX 2.3GHz 18-Core Processor CPU
$39.99
Dell Precision Tower 7910 | 2x Intel Xeon E5-2643 V3 | 32GB RAM | No HDD | No OS
$179.95
HP Workstation Z640 2x Xeon E5-2623V4 32GB Ram Dual 256GB SSD K420 Linux GA
$234.98
|
||
No Discussions have been posted on this vulnerability. |