Openvas Hostedscan Report 2024-08-27
Openvas Hostedscan Report 2024-08-27
Vulnerability Scan
Report
prepared by
HostedScan Security
hostedscan.com
HostedScan Security Vulnerability Scan Report
Overview
1 Executive Summary 3
2 Vulnerabilities By Target 4
3 Network Vulnerabilities 6
4 Glossary 11
hostedscan.com 2
Executive Summary Vulnerability Scan Report
1 Executive Summary
Vulnerability scans were conducted on select servers, networks, websites, and applications. This report contains the
discovered potential vulnerabilities from these scans. Vulnerabilities have been classified by severity. Higher severity
indicates a greater risk of a data breach, loss of integrity, or availability of the targets.
0 0 2 2 0
50% 50%
Vulnerability Categories
4
Network Vulnerabilities
hostedscan.com 3
Vulnerabilities By Target Vulnerability Scan Report
2 Vulnerabilities By Target
This section contains the vulnerability findings for each scanned target. Prioritization should be given to the
targets with the highest severity vulnerabilities. However, it is important to take into account the purpose of each
system and consider the potential impact a breach or an outage would have for the particular target.
https://www.powtoon.com/ 0 0 2 2 0
hostedscan.com 4
Vulnerabilities By Target | https://www.powtoon.com/ Vulnerability Scan Report
https://www.powtoon.com/
Target
Total Risks
0 0 2 2 0
50% 50%
Missing 'HttpOnly' Cookie Attribute (HTTP) Medium 61 days ago 0 days ago
cvss score: 5.0
ICMP Timestamp Reply Information Disclosure Low 61 days ago 0 days ago
cvss score: 2.1
hostedscan.com 5
Network Vulnerabilities Vulnerability Scan Report
3 Network Vulnerabilities
The OpenVAS network vulnerability scan tests servers and internet connected devices for over 150,000
vulnerabilities. OpenVAS uses the Common Vulnerability Scoring System (CVSS) to quantify the severity of findings.
0.0 is the lowest severity and 10.0 is the highest.
0 0 2 2 0
50% 50%
hostedscan.com 6
Network Vulnerabilities | Missing 'HttpOnly' Cookie Attribute (HTTP) Vulnerability Scan Report
Description
The remote HTTP web server / application is missing to set the 'HttpOnly' cookie attribute for one or more sent HTTP cookie.
The flaw exists if a session cookie is not using the 'HttpOnly' cookie attribute.
This allows a cookie to be accessed by JavaScript which could lead to session hijacking attacks.
Solution
- Set the 'HttpOnly' cookie attribute for any session cookie
- Evaluate / do an own assessment of the security impact on the web server / application and create an override for this result if there is
none (this can't be checked automatically by this VT)
References
https://www.rfc-editor.org/rfc/rfc6265#section-5.2.6
https://owasp.org/www-community/HttpOnly
https://wiki.owasp.org/index.php/Testing_for_cookies_attributes_(OTG-SESS-002)
hostedscan.com 7
Network Vulnerabilities | WordPress < 6.5 Private Information Exposure Vulnerability Vulnerability Scan Report
Description
WordPress is prone to a private information exposure via 'redirect_guess_404_permalink()'.
When guessing the proper URL to redirect a 404, WordPress only considers the post statuses and not the proper post type privacy
settings, leading to potential information disclosure.
This can allow unauthenticated attackers to expose the slug of a custom post whose 'publicly_queryable' post status has been set to
'false'.
Solution
Update to version 6.5 or later.
Note: As of 04/2024 the security fix is only available in version 6.5 and haven't been 'backported' to older versions yet.
References
CVE-2023-5692
https://core.trac.wordpress.org/ticket/59795
https://core.trac.wordpress.org/changeset/57645
https://bugzilla.redhat.com/show_bug.cgi?id=2273662
https://www.wordfence.com/threat-intel/vulnerabilities/id/6e6f993b-ce09-4050-84a1-cbe9953f36b1
https://patchstack.com/database/vulnerability/wordpress/wordpress-wordpress-core-plugin-6-4-3-sensitive-information-exposure-via-redirect-
guess-404-permalink-vulnerability
hostedscan.com 8
Network Vulnerabilities | TCP Timestamps Information Disclosure Vulnerability Scan Report
Description
The remote host implements TCP timestamps and therefore allows to compute the uptime.
Solution
To disable TCP timestamps on linux add the line 'net.ipv4.tcp_timestamps
References
https://datatracker.ietf.org/doc/html/rfc1323
https://datatracker.ietf.org/doc/html/rfc7323
https://web.archive.org/web/20151213072445/http://www.microsoft.com/en-us/download/details.aspx?id=9152
https://www.fortiguard.com/psirt/FG-IR-16-090
hostedscan.com 9
Network Vulnerabilities | ICMP Timestamp Reply Information Disclosure Vulnerability Scan Report
Description
The remote host responded to an ICMP timestamp request.
The Timestamp Reply is an ICMP message which replies to a Timestamp message. It consists of the originating timestamp sent by the
sender of the Timestamp as well as a receive timestamp and a transmit timestamp.
This information could theoretically be used to exploit weak time-based random number generators in other services.
Solution
Various mitigations are possible:
- Disable the support for ICMP timestamp on the remote host completely
- Protect the remote host by a firewall, and block ICMP packets passing through the firewall in either direction (either completely or only
for untrusted networks)
References
CVE-1999-0524
https://datatracker.ietf.org/doc/html/rfc792
https://datatracker.ietf.org/doc/html/rfc2780
hostedscan.com 10
Glossary Vulnerability Scan Report
4 Glossary
Accepted Vulnerability Vulnerability
An accepted vulnerability is one which has been manually A weakness in the computational logic (e.g., code) found
reviewed and classified as acceptable to not fix at this in software and hardware components that, when
time, such as a false positive scan result or an intentional exploited, results in a negative impact to confidentiality,
part of the system's architecture. integrity, or availability. Mitigation of the vulnerabilities in
this context typically involves coding changes, but could
Fully Qualified Domain Name (FQDN) also include specification changes or even specification
deprecations (e.g., removal of affected protocols or
A fully qualified domain name is a complete domain name
functionality in their entirety).
for a specific website or service on the internet. This
includes not only the website or service name, but also the
top-level domain name, such as .com, .org, .net, etc. For Target
example, 'www.example.com' is an FQDN. A target represents target is a single URL, IP address, or
fully qualified domain name (FQDN) that was scanned.
Network Vulnerabilities
The OpenVAS network vulnerability scan tests servers and Severity
internet connected devices for over 150,000 Severity represents the estimated impact potential of a
vulnerabilities. OpenVAS uses the Common Vulnerability particular vulnerability. Severity is divided into 5
Scoring System (CVSS) to quantify the severity of categories: Critical, High, Medium, Low and Accepted.
findings. 0.0 is the lowest severity and 10.0 is the highest.
CVSS Score
The CVSS 3.0 score is a global standard for evaluating
vulnerabilities with a 0 to 10 scale. CVSS maps to threat
levels:
0.1 - 3.9 = Low
4.0 - 6.9 = Medium
7.0 - 8.9 = High
9.0 - 10.0 = Critical
hostedscan.com 11
This report was prepared using
HostedScan Security ®
For more information, visit hostedscan.com
HostedScan, LLC.
hostedscan.com 12