For the past 7 or 8 weeks our PCI scanning service has been warning us of a vulnerability on the port we use for our web console listener:
Any suggestions on how we can resolve this to maintain PCI-compliance?
A remote attacker could execute arbitrary commands, create or overwrite files, or view files or directories on the web server.
In addition to hosting HTML pages, most web servers host programs or applications, which perform various functions, possibly including content management, discussion forums, or access to a database system. These programs process input provided by a client through a web browser. Input is normally entered by the user into an HTML form, but can also be entered directly using a URL such as http://server/index.php?input=data.
The Limbo CMS vulnerabilities were posted to [http://www.securityfocus.com/bid/16902] Bugtraq ID 16902.
Information from Target:
Service: xxxx:TCP
Sent: GET /index.php?option=frontpage&Itemid=system(id) HTTP/1.0
Host: www.xxxxxxxxxxx.com:xxxx
User-Agent: Mozilla/4.0
Connection: Keep-alive
Received: Set-Cookie: lsws_uid=a; expires=Mon, 12 Apr 2010 10:34:57 GMT; path=/
In addition to hosting HTML pages, most web servers host programs or applications, which perform various functions, possibly including content management, discussion forums, or access to a database system. These programs process input provided by a client through a web browser. Input is normally entered by the user into an HTML form, but can also be entered directly using a URL such as http://server/index.php?input=data.
The Limbo CMS vulnerabilities were posted to [http://www.securityfocus.com/bid/16902] Bugtraq ID 16902.
Information from Target:
Service: xxxx:TCP
Sent: GET /index.php?option=frontpage&Itemid=system(id) HTTP/1.0
Host: www.xxxxxxxxxxx.com:xxxx
User-Agent: Mozilla/4.0
Connection: Keep-alive
Received: Set-Cookie: lsws_uid=a; expires=Mon, 12 Apr 2010 10:34:57 GMT; path=/