WOC 中危漏洞该怎么修复

新手264994 7787

{{ttag.title}}
某公司 19大安全检查,发现某公司woc设备有如下漏洞,请问该如何修复
Host 10.100.253.10
Scanning of this host started at:Wed Oct 18 11:16:23 2017 UTC
Number of results:92
Port Summary for Host 10.100.253.10
Service (Port)Threat Level
6016/tcpLog
6017/tcpLog
6025/tcpLog
6007/tcpLog
10001/tcpLog
general/icmpLog
6004/tcpLog
85/tcpMedium
6030/tcpLog
80/tcpMedium
6027/tcpLog
6022/tcpLog
8000/tcpMedium
6014/tcpLog
6009/tcpLog
6012/tcpLog
6020/tcpLog
6018/tcpLog
6026/tcpLog
6008/tcpLog
general/tcpLow
6015/tcpLog
6005/tcpLog
6031/tcpLog
6024/tcpLog
6006/tcpLog
53/tcpLog
6003/tcpLog
6029/tcpLog
443/tcpMedium
6028/tcpLog
6011/tcpLog
general/CPE-TLog
6013/tcpLog
6019/tcpLog
6021/tcpLog
Security Issues for Host 10.100.253.10
80/tcp

Medium (CVSS: 5.0)
NVT: 某公司 UserDir Sensitive Information Disclosure (OID: 1.3.6.1.4.1.25623.1.0.10766)

SummaryAn information leak occurs on 某公司 based web servers whenever the UserDir module is enabled. The vulnerability allows an external attacker to enumerate existing accounts by requesting access to their home directory and monitoring the response.

Vulnerability Detection ResultVulnerability was detected according to the Vulnerability Detection Method.

Solution1) Disable this feature by changing 'UserDir public_html' (or whatever) to 'UserDir disabled'.
Or
2) Use a RedirectMatch rewrite rule under 某公司 -- this works even if there is no such entry in the password file, e.g.: RedirectMatch ^/~(.*)$ http://my-target-webserver.somewhere.org/$1
Or
3) Add into httpd.conf: ErrorDocument 404 http://localhost/sample.html ErrorDocument 403 http://localhost/sample.html (NOTE: You need to use a FQDN inside the URL for it to work properly).
Additional Information: http://www.securiteam.com/unixfocus/5WP0C1F5FI.html

Vulnerability Detection MethodDetails: 某公司 UserDir Sensitive Information Disclosure (OID: 1.3.6.1.4.1.25623.1.0.10766)
Version used: $Revision: 6063 $

References
CVE:CVE-2001-1013
BID:3335
CERT:CB-K14/0304 , DFN-CERT-2014-0315

85/tcp

Medium (CVSS: 5.0)
NVT: Missing `httpOnly` Cookie Attribute (OID: 1.3.6.1.4.1.25623.1.0.105925)

SummaryThe application is missing the 'httpOnly' cookie attribute

Vulnerability Detection ResultThe cookies:Set-Cookie: sf_session=a%3A5%3A%7Bs%3A10%3A%22session_id%22%3Bs%3A32%3A%22acd5671ceaa41e0d↵c3fb90b12501f18a%22%3Bs%3A10%3A%22ip_address%22%3Bs%3A12%3A%2210.100.4.102%22%3Bs%3A10%3A%↵22user_agent%22%3Bs%3A40%3A%22Mozilla%2F5.0+%5Ben%5D+%28X11%2C+U%3B+OpenVAS+8.0.8%29%22%3B↵s%3A13%3A%22last_activity%22%3Bi%3A1508326962%3Bs%3A9%3A%22user_data%22%3Bs%3A0%3A%22%22%3↵B%7Deb04956e91a1451e9b11714acfbcda31; path=/ are missing the "httpOnly" attribute.
SolutionSolution type: Mitigation
Set the 'httpOnly' attribute for any session cookie.

Affected Software/OSApplication with session handling in cookies.

Vulnerability InsightThe flaw is due to a cookie is not using the 'httpOnly' attribute. This allows a cookie to be accessed by JavaScript which could lead to session hijacking attacks.

Vulnerability Detection MethodCheck all cookies sent by the application for a missing 'httpOnly' attribute
Details: Missing `httpOnly` Cookie Attribute (OID: 1.3.6.1.4.1.25623.1.0.105925)
Version used: $Revision: 5270 $

References
Other:https://www.owasp.org/index.php/HttpOnly

https://www.owasp.org/index.php/Testing_for_cookies_attributes_(OTG-SESS-002)

85/tcp

Medium (CVSS: 5.0)
NVT: 某公司 UserDir Sensitive Information Disclosure (OID: 1.3.6.1.4.1.25623.1.0.10766)

SummaryAn information leak occurs on 某公司 based web servers whenever the UserDir module is enabled. The vulnerability allows an external attacker to enumerate existing accounts by requesting access to their home directory and monitoring the response.

Vulnerability Detection ResultVulnerability was detected according to the Vulnerability Detection Method.

Solution1) Disable this feature by changing 'UserDir public_html' (or whatever) to 'UserDir disabled'.
Or
2) Use a RedirectMatch rewrite rule under 某公司 -- this works even if there is no such entry in the password file, e.g.: RedirectMatch ^/~(.*)$ http://my-target-webserver.somewhere.org/$1
Or
3) Add into httpd.conf: ErrorDocument 404 http://localhost/sample.html ErrorDocument 403 http://localhost/sample.html (NOTE: You need to use a FQDN inside the URL for it to work properly).
Additional Information: http://www.securiteam.com/unixfocus/5WP0C1F5FI.html

Vulnerability Detection MethodDetails: 某公司 UserDir Sensitive Information Disclosure (OID: 1.3.6.1.4.1.25623.1.0.10766)
Version used: $Revision: 6063 $

References
CVE:CVE-2001-1013
BID:3335
CERT:CB-K14/0304 , DFN-CERT-2014-0315

443/tcp

Medium (CVSS: 5.0)
NVT: SSL/TLS: Report Vulnerable Cipher Suites for HTTPS (OID: 1.3.6.1.4.1.25623.1.0.108031)

SummaryThis routine reports all SSL/TLS cipher suites accepted by a service where attack vectors exists only on HTTPS services.

Vulnerability Detection Result'Vulnerable' cipher suites accepted by this service via the TLSv1.0 protocol:TLS_RSA_WITH_3DES_EDE_CBC_SHA (SWEET32)
SolutionSolution type: Mitigation
The configuration of this services should be changed so that it does not accept the listed cipher suites anymore.
Please see the references for more resources supporting you with this task.

Affected Software/OSServices accepting vulnerable SSL/TLS cipher suites via HTTPS.

Vulnerability InsightThese rules are applied for the evaluation of the vulnerable cipher suites:
- 64-bit block cipher 3DES vulnerable to the SWEET32 attack (CVE-2016-2183).

Vulnerability Detection MethodDetails: SSL/TLS: Report Vulnerable Cipher Suites for HTTPS (OID: 1.3.6.1.4.1.25623.1.0.108031)
Version used: $Revision: 5232 $

References
CVE:CVE-2016-2183, CVE-2016-6329
CERT:CB-K17/1055 , CB-K17/1026 , CB-K17/0939 , CB-K17/0917 , CB-K17/0915 , CB-K17/0877 , CB-K17/0796 , CB-K17/0724 , CB-K17/0661 , CB-K17/0657 , CB-K17/0582 , CB-K17/0581 , CB-K17/0506 , CB-K17/0504 , CB-K17/0467 , CB-K17/0345 , CB-K17/0098 , CB-K17/0089 , CB-K17/0086 , CB-K17/0082 , CB-K16/1837 , CB-K16/1830 , CB-K16/1635 , CB-K16/1630 , CB-K16/1624 , CB-K16/1622 , CB-K16/1500 , CB-K16/1465 , CB-K16/1307 , CB-K16/1296 , DFN-CERT-2017-1785 , DFN-CERT-2017-1626 , DFN-CERT-2017-1326 , DFN-CERT-2017-1239 , DFN-CERT-2017-1238 , DFN-CERT-2017-1090 , DFN-CERT-2017-1060 , DFN-CERT-2017-0968 , DFN-CERT-2017-0947 , DFN-CERT-2017-0946 , DFN-CERT-2017-0904 , DFN-CERT-2017-0816 , DFN-CERT-2017-0746 , DFN-CERT-2017-0677 , DFN-CERT-2017-0675 , DFN-CERT-2017-0611 , DFN-CERT-2017-0609 , DFN-CERT-2017-0522 , DFN-CERT-2017-0519 , DFN-CERT-2017-0482 , DFN-CERT-2017-0351 , DFN-CERT-2017-0090 , DFN-CERT-2017-0089 , DFN-CERT-2017-0088 , DFN-CERT-2017-0086 , DFN-CERT-2016-1943 , DFN-CERT-2016-1937 , DFN-CERT-2016-1732 , DFN-CERT-2016-1726 , DFN-CERT-2016-1715 , DFN-CERT-2016-1714 , DFN-CERT-2016-1588 , DFN-CERT-2016-1555 , DFN-CERT-2016-1391 , DFN-CERT-2016-1378
Other:https://bettercrypto.org/

https://mozilla.github.io/server-side-tls/ssl-config-generator/

https://sweet32.info/

8000/tcp

Medium (CVSS: 5.0)
NVT: 某公司 UserDir Sensitive Information Disclosure (OID: 1.3.6.1.4.1.25623.1.0.10766)

SummaryAn information leak occurs on 某公司 based web servers whenever the UserDir module is enabled. The vulnerability allows an external attacker to enumerate existing accounts by requesting access to their home directory and monitoring the response.

Vulnerability Detection ResultVulnerability was detected according to the Vulnerability Detection Method.

Solution1) Disable this feature by changing 'UserDir public_html' (or whatever) to 'UserDir disabled'.
Or
2) Use a RedirectMatch rewrite rule under 某公司 -- this works even if there is no such entry in the password file, e.g.: RedirectMatch ^/~(.*)$ http://my-target-webserver.somewhere.org/$1
Or
3) Add into httpd.conf: ErrorDocument 404 http://localhost/sample.html ErrorDocument 403 http://localhost/sample.html (NOTE: You need to use a FQDN inside the URL for it to work properly).
Additional Information: http://www.securiteam.com/unixfocus/5WP0C1F5FI.html

Vulnerability Detection MethodDetails: 某公司 UserDir Sensitive Information Disclosure (OID: 1.3.6.1.4.1.25623.1.0.10766)
Version used: $Revision: 6063 $

References
CVE:CVE-2001-1013
BID:3335
CERT:CB-K14/0304 , DFN-CERT-2014-0315

8000/tcp

Medium (CVSS: 4.3)
NVT: SSL/TLS: Report Weak Cipher Suites (OID: 1.3.6.1.4.1.25623.1.0.103440)

SummaryThis routine reports all Weak SSL/TLS cipher suites accepted by a service.
NOTE: No severity for SMTP services with 'Opportunistic TLS' and weak cipher suites on port 25/tcp is reported. If too strong cipher suites are configured for this service the alternative would be to fall back to an even more insecure cleartext communication.

Vulnerability Detection Result'Weak' cipher suites accepted by this service via the TLSv1.0 protocol:TLS_RSA_WITH_RC4_128_SHA
SolutionSolution type: Mitigation
The configuration of this services should be changed so that it does not accept the listed weak cipher suites anymore.
Please see the references for more resources supporting you with this task.

Vulnerability InsightThese rules are applied for the evaluation of the cryptographic strength:
- RC4 is considered to be weak (CVE-2013-2566, CVE-2015-2808).
- Ciphers using 64 bit or less are considered to be vulnerable to brute force methods and therefore considered as weak (CVE-2015-4000).
- 1024 bit RSA authentication is considered to be insecure and therefore as weak.
- Any cipher considered to be secure for only the next 10 years is considered as medium
- Any other cipher is considered as strong

Vulnerability Detection MethodDetails: SSL/TLS: Report Weak Cipher Suites (OID: 1.3.6.1.4.1.25623.1.0.103440)
Version used: $Revision: 5525 $

References
CVE:CVE-2013-2566, CVE-2015-2808, CVE-2015-4000
CERT:CB-K16/1593 , CB-K16/1552 , CB-K16/1102 , CB-K16/0617 , CB-K16/0599 , CB-K16/0168 , CB-K16/0121 , CB-K16/0090 , CB-K16/0030 , CB-K15/1751 , CB-K15/1591 , CB-K15/1550 , CB-K15/1517 , CB-K15/1514 , CB-K15/1464 , CB-K15/1442 , CB-K15/1334 , CB-K15/1269 , CB-K15/1136 , CB-K15/1090 , CB-K15/1059 , CB-K15/1022 , CB-K15/1015 , CB-K15/0986 , CB-K15/0964 , CB-K15/0962 , CB-K15/0932 , CB-K15/0927 , CB-K15/0926 , CB-K15/0907 , CB-K15/0901 , CB-K15/0896 , CB-K15/0889 , CB-K15/0877 , CB-K15/0850 , CB-K15/0849 , CB-K15/0834 , CB-K15/0827 , CB-K15/0802 , CB-K15/0764 , CB-K15/0733 , CB-K15/0667 , CB-K14/0935 , CB-K13/0942 , DFN-CERT-2016-1692 , DFN-CERT-2016-1648 , DFN-CERT-2016-1168 , DFN-CERT-2016-0665 , DFN-CERT-2016-0642 , DFN-CERT-2016-0184 , DFN-CERT-2016-0135 , DFN-CERT-2016-0101 , DFN-CERT-2016-0035 , DFN-CERT-2015-1853 , DFN-CERT-2015-1679 , DFN-CERT-2015-1632 , DFN-CERT-2015-1608 , DFN-CERT-2015-1542 , DFN-CERT-2015-1518 , DFN-CERT-2015-1406 , DFN-CERT-2015-1341 , DFN-CERT-2015-1194 , DFN-CERT-2015-1144 , DFN-CERT-2015-1113 , DFN-CERT-2015-1078 , DFN-CERT-2015-1067 , DFN-CERT-2015-1038 , DFN-CERT-2015-1016 , DFN-CERT-2015-1012 , DFN-CERT-2015-0980 , DFN-CERT-2015-0977 , DFN-CERT-2015-0976 , DFN-CERT-2015-0960 , DFN-CERT-2015-0956 , DFN-CERT-2015-0944 , DFN-CERT-2015-0937 , DFN-CERT-2015-0925 , DFN-CERT-2015-0884 , DFN-CERT-2015-0881 , DFN-CERT-2015-0879 , DFN-CERT-2015-0866 , DFN-CERT-2015-0844 , DFN-CERT-2015-0800 , DFN-CERT-2015-0737 , DFN-CERT-2015-0696 , DFN-CERT-2014-0977
Other:https://www.bsi.bund.de/SharedDocs/Warnmeldungen/DE/CB/warnmeldung_cb-k16-1465_update_6.html

https://bettercrypto.org/

https://mozilla.github.io/server-side-tls/ssl-config-generator/

443/tcp

Medium (CVSS: 4.0)
NVT: SSL/TLS: Certificate Signed Using A Weak Signature Algorithm (OID: 1.3.6.1.4.1.25623.1.0.105880)

SummaryThe remote service is using a SSL/TLS certificate chain that has been signed using a cryptographically weak hashing algorithm.

Vulnerability Detection ResultThe following certificates are part of the certificate chain but using insecure signature ↵algorithms:Subject:              CN=10.100.253.10Signature Algorithm:  sha1WithRSAEncryption
SolutionSolution type: Mitigation
Servers that use SSL/TLS certificates signed using an SHA-1 signature will need to obtain new SHA-2 signed SSL/TLS certificates to avoid these web browser SSL/TLS certificate warnings.

Vulnerability InsightSecure Hash Algorithm 1 (SHA-1) is considered cryptographically weak and not secure enough for ongoing use. Beginning as late as January 2017 and as early as June 2016, browser developers such as Microsoft and Google will begin warning users when users visit web sites that use SHA-1 signed Secure Socket Layer (SSL) certificates.

Vulnerability Detection MethodCheck which algorithm was used to sign the remote SSL/TLS Certificate.
Details: SSL/TLS: Certificate Signed Using A Weak Signature Algorithm (OID: 1.3.6.1.4.1.25623.1.0.105880)
Version used: $Revision: 4781 $

References
Other:https://blog.mozilla.org/security/2014/09/23/phasing-out-certificates-with-sha-1-based-signature-algorithms/

8000/tcp

Medium (CVSS: 4.0)
NVT: SSL/TLS: Certificate Signed Using A Weak Signature Algorithm (OID: 1.3.6.1.4.1.25623.1.0.105880)

SummaryThe remote service is using a SSL/TLS certificate chain that has been signed using a cryptographically weak hashing algorithm.

Vulnerability Detection ResultThe following certificates are part of the certificate chain but using insecure signature ↵algorithms:Subject:              1.2.840.113549.1.9.1=#73736C4073616E67666F722E636F6D,CN=sslvpn,OU=ss↵lvpn,O=sangfor,L=shenzhen,ST=guangdong,C=CNSignature Algorithm:  sha1WithRSAEncryption
SolutionSolution type: Mitigation
Servers that use SSL/TLS certificates signed using an SHA-1 signature will need to obtain new SHA-2 signed SSL/TLS certificates to avoid these web browser SSL/TLS certificate warnings.

Vulnerability InsightSecure Hash Algorithm 1 (SHA-1) is considered cryptographically weak and not secure enough for ongoing use. Beginning as late as January 2017 and as early as June 2016, browser developers such as Microsoft and Google will begin warning users when users visit web sites that use SHA-1 signed Secure Socket Layer (SSL) certificates.

Vulnerability Detection MethodCheck which algorithm was used to sign the remote SSL/TLS Certificate.
Details: SSL/TLS: Certificate Signed Using A Weak Signature Algorithm (OID: 1.3.6.1.4.1.25623.1.0.105880)
Version used: $Revision: 4781 $

References
Other:https://blog.mozilla.org/security/2014/09/23/phasing-out-certificates-with-sha-1-based-signature-algorithms/

该疑问已被 解决,获得了 20 S豆

回帖即可获得
2S豆
,被楼主采纳即奖励20S豆+10分钟内回帖奖励10S豆 [已过期] ,了解更多S豆奖励信息

完善手机号和公司名称,让服务更省心更便捷!立即完善

回复新手264994:您好 这个是SSL VPN设备,不是WOC设备哦
本答案是否对你有帮助?
Sangfor闪电回_小丸子 发表于 2017-10-20 14:42
  
您好 麻烦提供设备的详细版本信息
谢谢
adds 发表于 2017-10-20 14:42
  
有中文版的吗?貌似国内官方语言是中文啊。
携手旅游 发表于 2017-10-20 14:42
  
请问是哪个厂家设备检查出来的,这是开放的端口。很正常啊
新手147804 发表于 2019-5-20 00:32
  
请问是哪个厂家设备检查出来的,这是开放的端口。很正常啊

等我来答:

换一批

发表新帖
热门标签
全部标签>
每日一问
技术笔记
功能体验
技术咨询
新版本体验
2023技术争霸赛专题
干货满满
技术盲盒
标准化排查
产品连连看
GIF动图学习
技术晨报
信服课堂视频
安装部署配置
运维工具
秒懂零信任
自助服务平台操作指引
每日一记
用户认证
通用技术
安全攻防
答题自测
云计算知识
SDP百科
设备维护
深信服技术支持平台
畅聊IT
sangfor周刊
资源访问
排障笔记本
社区帮助指南
专家问答
技术圆桌
在线直播
MVP
网络基础知识
升级
上网策略
测试报告
日志审计
问题分析处理
流量管理
原创分享
解决方案
VPN 对接
项目案例
SANGFOR资讯
专家分享
技术顾问
信服故事
功能咨询
终端接入
授权
迁移
地址转换
虚拟机
存储
加速技术
产品预警公告
玩转零信任
信服圈儿
S豆商城资讯
技术争霸赛
「智能机器人」
追光者计划
答题榜单公布
纪元平台
卧龙计划
华北区拉练
天逸直播
以战代练
山东区技术晨报
文档捉虫活动
齐鲁TV
华北区交付直播
每周精选

本版版主

26
76
83

发帖

粉丝

关注

本版达人

新手24268...

本周建议达人

阿凯

本周分享达人

新手39341...

本周提问达人