ITALY VA - Report - Docx
ITALY VA - Report - Docx
ITALY VA - Report - Docx
185.53.151 https://185.53.151.170/
.170 – port
443
https://
autodiscover.janusetcie.com/
owa/auth/logon.aspx?
185.53.151 replaceCurrent=1&url=https%3a
https://185.53.151.171/
.170-port %2f
587 %2fautodiscover.janusetcie.com
https://185.53.151.172/
%2fowa%2f
185.53.151
.171
https://185.53.151.172/
https://185.53.151.176/
185.53.151
.172
185.53.151
.174
185.53.151
.176
185.53.151
.180
185.53.151
.181
185.53.151
.182
185.53.151
.189
Condition We observed that the multiple IPs were found vulnerable to Sweet 32.
The remote host supports the use of SSL ciphers that offer medium strength
encryption. Nessus regards medium strength as any encryption that uses key
lengths at least 64 bits and less than 112 bits, or else that uses the 3DES en-
cryption suite
Proof of Concept
Figure- Sweet 32 vulnerable in 38.142.77.172
Criteria As per the best practice, the Mac OS X user should configure their worksta-
tion to disable the creation of .DS_Store files on the network shares so that
there won't be any disclosure of information like icons positions,
An attacker can:
Impact
Man-in-the-middle attack: An attacker can perform a man-in-
the-middle (MITM) attack on the communication channel to sniff
data.
It is recommended to:
Recommend
ation Use OpenSSL security update RHSA-2016:1940.
2. Unsupported webserver version Medium
Condition We observed that 38.142.77.172 is found using unsupported web server ver-
sion.
Proof of Concept
Figure- .Unsupported web server version detection.
Criteria As per the best practice the old and unsupported version must be upgraded
to the latest version
An attacker can:
Impact
Gain the information on the structure and contents of the website.
It is recommended to:
Recommend Remove the web server if it is no longer needed.
ation
Upgrade to the supported version or switch to another server.
3. Apple Mac OS X Find-By-Content DS_Store Web Medium
Directory Listing vulnerability in web application
CVSS Score: 5.0
Applicatio Authenticate Internal/ Affected URL
Identification n d/ External
Unauthentica
ted
162.221.94 Unauthenticat External https://162.221.94.74/.DS_Store
.74 ed
Condition We observed that it is possible to get the list of files which contain the view-
ing preference information, which controls how the Mac OS X operating sys-
tem opens a user's folders and how the folders appears present in the re-
mote directory of the vulnerable web application.
The .DS_Store files are created by Mac OS X Finder , it helps to disclose the
information like icons positions on the desktop
Proof of Concept
s
Criteria As per the best practice, the Mac OS X user should configure their worksta-
tion to disable the creation of .DS_Store files on the network shares.
An attacker can:
Impact
Gain the information on the structure and contents of the website.
It is recommended to:
Recommend Configure the web server so as to prevent the download of .DS_Store
ation file.
Block access to hidden files (starting with a dot) within your
webservers configuration.
4. Disclosure of server information in multiple Medium
91.121.234 https://91.121.234.53/
.53
104.131.56 https://104.131.56.232
.232
162.221.94 https://162.221.94.74
.74
184.53.151 https://184.53.151.181
.181
185.53.151
.176
https://185.53.151.176
185.23.151
.180
https://185.23.151.180
185.53.151
.182
https://185.23.151.182
Proof of Concept
mul
An attacker can:
Impact
Gain the information on the structure and contents of the website.
It is recommended to:
Recommend Configure the web server so as to prevent the download of .DS_Store
ation file.
Block access to hidden files (starting with a dot) within your
webservers configuration.