0% found this document useful (0 votes)
29 views133 pages

Openvas Scanner Output 2024-07-09

This document is a security scan report detailing the results of an automatic scan conducted on July 9, 2024. The scan identified 6 medium-level threats and 1 low-level threat across the host 43.255.154.27, with a total of 155 log entries. Recommendations for mitigating the identified issues are provided for each threat found.

Uploaded by

Yaah Nighot
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views133 pages

Openvas Scanner Output 2024-07-09

This document is a security scan report detailing the results of an automatic scan conducted on July 9, 2024. The scan identified 6 medium-level threats and 1 low-level threat across the host 43.255.154.27, with a total of 155 log entries. Recommendations for mitigating the identified issues are provided for each threat found.

Uploaded by

Yaah Nighot
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 133

Scan Report

July 9, 2024

Summary
This document reports on the results of an automatic security scan. All dates are
displayed using the timezone Coordinated Universal Time, which is abbreviated UTC.
The task was 668d442b95d9ec8621e73f2b-668d4df895d9ec8621e9f4a4-e4ed38. The scan
started at Tue Jul 9 14:51:17 2024 UTC and ended at . The report rst summarises the
results found. Then, for each host, the report describes every issue found. Please consider
the advice given in each description, in order to rectify the issue.

Contents

1 Result Overview 2
2 Results per Host 2
2.1 43.255.154.27 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
2.1.1 Medium 110/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
2.1.2 Medium 22/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2.1.3 Medium 21/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2.1.4 Medium 143/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.1.5 Medium 443/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.1.6 Low general/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.1.7 Log 2096/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
2.1.8 Log 2095/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
2.1.9 Log 110/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
2.1.10 Log 3306/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
2.1.11 Log general/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
2.1.12 Log 2077/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
2.1.13 Log 2083/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
2.1.14 Log 2087/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
2.1.15 Log 993/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
2.1.16 Log 80/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
2.1.17 Log 22/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
2.1.18 Log 465/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79

Generated by HostedScan
CONTENTS 2

2.1.19 Log 21/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83


2.1.20 Log 143/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
2.1.21 Log 2086/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
2.1.22 Log 2078/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
2.1.23 Log 995/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
2.1.24 Log 587/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
2.1.25 Log 2082/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
2.1.26 Log 25/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
2.1.27 Log 443/tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118

Generated by HostedScan
2 RESULTS PER HOST 3

1 Result Overview

Host High Medium Low Log False Positive


43.255.154.27 0 6 1 155 0
Total: 1 0 6 1 155 0

Vendor security updates are not trusted.


Overrides are o. Even when a result has an override, this report uses the actual threat of the
result.
Information on overrides is included in the report.
Notes are included in the report.
This report might not show details of all issues that were found.
Only results with a minimum QoD of 70 are shown.

This report contains all 162 results selected by the ltering described above. Before ltering
there were 185 results.

2 Results per Host


2.1 43.255.154.27

Host scan start Tue Jul 9 15:02:02 2024 UTC


Host scan end

Service (Port) Threat Level


110/tcp Medium
22/tcp Medium
21/tcp Medium
143/tcp Medium
443/tcp Medium
general/tcp Low
2096/tcp Log
2095/tcp Log
110/tcp Log
3306/tcp Log
general/tcp Log
2077/tcp Log
2083/tcp Log
2087/tcp Log
993/tcp Log
80/tcp Log
22/tcp Log
465/tcp Log
21/tcp Log
. . . (continues) . . .

Generated by HostedScan
2 RESULTS PER HOST 4

. . . (continued) . . .
Service (Port) Threat Level
143/tcp Log
2086/tcp Log
2078/tcp Log
995/tcp Log
587/tcp Log
2082/tcp Log
25/tcp Log
443/tcp Log

2.1.1 Medium 110/tcp

Medium (CVSS: 4.8)


NVT: POP3 Unencrypted Cleartext Login

Summary
The remote host is running a POP3 daemon that allows cleartext logins over unencrypted con-
nections.
NOTE: Depending on the POP3 server conguration valid credentials needs to be given to the
settings of 'Login congurations' OID: 1.3.6.1.4.1.25623.1.0.10870.

Quality of Detection: 70
Vulnerability Detection Result
The remote POP3 server accepts logins via the following cleartext authentication
,→ mechanisms over unencrypted connections:
USER
SASL PLAIN LOGIN
The remote POP3 server supports the 'STLS' command but isn't enforcing the use o
,→f it for the cleartext authentication mechanisms.

Impact
An attacker can uncover user names and passwords by sning trac to the POP3 daemon if a
less secure authentication mechanism (eg, USER command, AUTH PLAIN, AUTH LOGIN) is
used.

Solution:
Solution type: Mitigation
Congure the remote server to always enforce encrypted connections via SSL/TLS with the
'STLS' command.

Vulnerability Detection Method


Details: POP3 Unencrypted Cleartext Login
OID:1.3.6.1.4.1.25623.1.0.15855
Version used: 2023-08-03T05:05:16Z
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 5

. . . continued from previous page . . .

References
osvdb: 3119
url: http://www.ietf.org/rfc/rfc2222.txt
url: http://www.ietf.org/rfc/rfc2595.txt

[ return to 43.255.154.27 ]

2.1.2 Medium 22/tcp

Medium (CVSS: 4.3)


NVT: Weak Encryption Algorithm(s) Supported (SSH)

Summary
The remote SSH server is congured to allow / support weak encryption algorithm(s).

Quality of Detection: 80
Vulnerability Detection Result
The remote SSH server supports the following weak client-to-server encryption al
,→gorithm(s):
aes128-cbc
aes256-cbc
The remote SSH server supports the following weak server-to-client encryption al
,→gorithm(s):
aes128-cbc
aes256-cbc

Solution:
Solution type: Mitigation
Disable the reported weak encryption algorithm(s).

Vulnerability Insight
- The 'arcfour' cipher is the Arcfour stream cipher with 128-bit keys. The Arcfour cipher is
believed to be compatible with the RC4 cipher [SCHNEIER]. Arcfour (and RC4) has problems
with weak keys, and should not be used anymore.
- The 'none' algorithm species that no encryption is to be done. Note that this method provides
no condentiality protection, and it is NOT RECOMMENDED to use it.
- A vulnerability exists in SSH messages that employ CBC mode that may allow an attacker to
recover plaintext from a block of ciphertext.

Vulnerability Detection Method


Checks the supported encryption algorithms (client-to-server and server-to-client) of the remote
SSH server.
Currently weak encryption algorithms are dened as the following:
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 6

. . . continued from previous page . . .


- Arcfour (RC4) cipher based algorithms
- 'none' algorithm
- CBC mode cipher based algorithms
Details: Weak Encryption Algorithm(s) Supported (SSH)
OID:1.3.6.1.4.1.25623.1.0.105611
Version used: 2024-06-14T05:05:48Z

References
url: https://www.rfc-editor.org/rfc/rfc8758
url: https://www.kb.cert.org/vuls/id/958563
url: https://www.rfc-editor.org/rfc/rfc4253#section-6.3

Medium (CVSS: 5.3)


NVT: Weak Key Exchange (KEX) Algorithm(s) Supported (SSH)

Summary
The remote SSH server is congured to allow / support weak key exchange (KEX) algorithm(s).

Quality of Detection: 80
Vulnerability Detection Result
The remote SSH server supports the following weak KEX algorithm(s):
KEX algorithm | Reason
------------------------------------------------
diffie-hellman-group-exchange-sha1 | Using SHA-1

Impact
An attacker can quickly break individual connections.

Solution:
Solution type: Mitigation
Disable the reported weak KEX algorithm(s)
- 1024-bit MODP group / prime KEX algorithms:
Alternatively use elliptic-curve Die-Hellmann in general, e.g. Curve 25519.

Vulnerability Insight
- 1024-bit MODP group / prime KEX algorithms:
Millions of HTTPS, SSH, and VPN servers all use the same prime numbers for Die-Hellman
key exchange. Practitioners believed this was safe as long as new key exchange messages were
generated for every connection. However, the rst step in the number eld sieve-the most ecient
algorithm for breaking a Die-Hellman connection-is dependent only on this prime.
A nation-state can break a 1024-bit prime.

Vulnerability Detection Method


Checks the supported KEX algorithms of the remote SSH server.
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 7

. . . continued from previous page . . .


Currently weak KEX algorithms are dened as the following:
- non-elliptic-curve Die-Hellmann (DH) KEX algorithms with 1024-bit MODP group / prime
- ephemerally generated key exchange groups uses SHA-1
- using RSA 1024-bit modulus key
Details: Weak Key Exchange (KEX) Algorithm(s) Supported (SSH)
OID:1.3.6.1.4.1.25623.1.0.150713
Version used: 2024-06-14T05:05:48Z

References
url: https://weakdh.org/sysadmin.html
url: https://www.rfc-editor.org/rfc/rfc9142
url: https://www.rfc-editor.org/rfc/rfc9142#name-summary-guidance-for-implem
url: https://www.rfc-editor.org/rfc/rfc6194
url: https://www.rfc-editor.org/rfc/rfc4253#section-6.5

[ return to 43.255.154.27 ]

2.1.3 Medium 21/tcp

Medium (CVSS: 4.8)


NVT: FTP Unencrypted Cleartext Login

Summary
The remote host is running a FTP service that allows cleartext logins over unencrypted connec-
tions.

Quality of Detection: 70
Vulnerability Detection Result
The remote FTP service accepts logins without a previous sent 'AUTH TLS' command
,→. Response(s):
Non-anonymous sessions: 331 User openvasvt OK. Password required
Anonymous sessions: 331 User anonymous OK. Password required
The remote FTP service supports the 'AUTH TLS' command but isn't enforcing the u
,→se of it for:
- Non-anonymous sessions
- Anonymous sessions

Impact
An attacker can uncover login names and passwords by sning trac to the FTP service.

Solution:
Solution type: Mitigation
Enable FTPS or enforce the connection via the 'AUTH TLS' command. Please see the manual
of the FTP service for more information.

. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 8

. . . continued from previous page . . .

Vulnerability Detection Method


Tries to login to a non FTPS enabled FTP service without sending a 'AUTH TLS' command
rst and checks if the service is accepting the login without enforcing the use of the 'AUTH TLS'
command.
Details: FTP Unencrypted Cleartext Login
OID:1.3.6.1.4.1.25623.1.0.108528
Version used: 2023-12-20T05:05:58Z

[ return to 43.255.154.27 ]

2.1.4 Medium 143/tcp

Medium (CVSS: 4.8)


NVT: IMAP Unencrypted Cleartext Login

Summary
The remote host is running an IMAP daemon that allows cleartext logins over unencrypted
connections.
NOTE: Valid credentials needs to given to the settings of 'Login congurations' OID:
1.3.6.1.4.1.25623.1.0.10870.

Quality of Detection: 70
Vulnerability Detection Result
The remote IMAP server accepts logins via the following cleartext authentication
,→ mechanisms over unencrypted connections:
AUTH=LOGIN
AUTH=PLAIN
The remote IMAP server supports the 'STARTTLS' command but isn't enforcing the u
,→se of it for the cleartext authentication mechanisms.

Impact
An attacker can uncover user names and passwords by sning trac to the IMAP daemon if a
less secure authentication mechanism (eg, LOGIN command, AUTH=PLAIN, AUTH=LOGIN)
is used.

Solution:
Solution type: Mitigation
Congure the remote server to always enforce encrypted connections via SSL/TLS with the
'STARTTLS' command.

Vulnerability Detection Method


Details: IMAP Unencrypted Cleartext Login
OID:1.3.6.1.4.1.25623.1.0.15856
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 9

. . . continued from previous page . . .


Version used: 2023-08-01T13:29:10Z

References
osvdb: 3119
url: http://www.ietf.org/rfc/rfc2222.txt
url: http://www.ietf.org/rfc/rfc2595.txt

[ return to 43.255.154.27 ]

2.1.5 Medium 443/tcp

Medium (CVSS: 5.0)


NVT: Missing 'Secure' Cookie Attribute (HTTP)

Summary
The remote HTTP web server / application is missing to set the 'Secure' cookie attribute for
one or more sent HTTP cookie.

Quality of Detection: 70
Vulnerability Detection Result
The cookie(s):
Set-Cookie: laravel_session=eyJpdiI6IjRYXC9yXC9hOXdCeHBzU1pzM1RTXC91ZFE9PSIsInZh
,→bHVlIjoiRlFLR2wrdjgrTXdUTFdOTVFZVllYXC9IcHdJTGVkZjRBSnI3RVdGXC9OY1pvb3pvNFFyUW
,→VwVitqYlZUdTRVS2JnSnlUeENWU2dMSnhNaEhnOW42NktCUT09IiwibWFjIjoiNDVlYmU1MmM0Y2Qx
,→YmM4OTQ5MTg1YWZiYTYyMmIyYjJiNDY4YWVhZTE5YWZhYTZlYjZjYTYyNmM1ZjA0MDY4NSJ9; expi
,→res=Tue, 09-Jul-2024 17:28:32 GMT; Max-Age=***replaced***; path=/; httponly
is/are missing the "Secure" cookie attribute.

Solution:
Solution type: Mitigation
- Set the 'Secure' cookie attribute for any cookies that are sent over a SSL/TLS connection
- Evaluate / do an own assessment of the security impact on the web server / application and
create an override for this result if there is none (this can't be checked automatically by this VT)

Aected Software/OS
Any web application accessible via a SSL/TLS connection (HTTPS) and at the same time also
accessible over a cleartext connection (HTTP).

Vulnerability Insight
The aw exists if a cookie is not using the 'Secure' cookie attribute and is sent over a SSL/TLS
connection.
This allows a cookie to be passed to the server by the client over non-secure channels (HTTP)
and subsequently allows an attacker to e.g. conduct session hijacking attacks.
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 10

. . . continued from previous page . . .

Vulnerability Detection Method


Checks all cookies sent by the remote HTTP web server / application over a SSL/TLS connection
for a missing 'Secure' cookie attribute.
Details: Missing 'Secure' Cookie Attribute (HTTP)
OID:1.3.6.1.4.1.25623.1.0.902661
Version used: 2024-01-12T16:12:12Z

References
url: https://www.rfc-editor.org/rfc/rfc6265#section-5.2.5
url: https://owasp.org/www-community/controls/SecureCookieAttribute
url: https://wiki.owasp.org/index.php/Testing_for_cookies_attributes_(OTG-SESS-0
,→02)

[ return to 43.255.154.27 ]

2.1.6 Low general/tcp

Low (CVSS: 2.6)


NVT: TCP Timestamps Information Disclosure

Summary
The remote host implements TCP timestamps and therefore allows to compute the uptime.

Quality of Detection: 80
Vulnerability Detection Result
It was detected that the host implements RFC1323/RFC7323.
The following timestamps were retrieved with a delay of 1 seconds in-between:
Packet 1: 3228000246
Packet 2: 3228002232

Impact
A side eect of this feature is that the uptime of the remote host can sometimes be computed.

Solution:
Solution type: Mitigation
To disable TCP timestamps on linux add the line 'net.ipv4.tcp_timestamps = 0' to
/etc/sysctl.conf. Execute 'sysctl -p' to apply the settings at runtime.
To disable TCP timestamps on Windows execute 'netsh int tcp set global timestamps=disabled'
Starting with Windows Server 2008 and Vista, the timestamp can not be completely disabled.
The default behavior of the TCP/IP stack on this Systems is to not use the Timestamp options
when initiating TCP connections, but use them if the TCP peer that is initiating communication
includes them in their synchronize (SYN) segment.
See the references for more information.

. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 11

. . . continued from previous page . . .

Aected Software/OS
TCP implementations that implement RFC1323/RFC7323.

Vulnerability Insight
The remote host implements TCP timestamps, as dened by RFC1323/RFC7323.

Vulnerability Detection Method


Special IP packets are forged and sent with a little delay in between to the target IP. The
responses are searched for a timestamps. If found, the timestamps are reported.
Details: TCP Timestamps Information Disclosure
OID:1.3.6.1.4.1.25623.1.0.80091
Version used: 2023-12-15T16:10:08Z

References
url: https://datatracker.ietf.org/doc/html/rfc1323
url: https://datatracker.ietf.org/doc/html/rfc7323
url: https://web.archive.org/web/20151213072445/http://www.microsoft.com/en-us/d
,→ownload/details.aspx?id=9152
url: https://www.fortiguard.com/psirt/FG-IR-16-090

[ return to 43.255.154.27 ]

2.1.7 Log 2096/tcp

Log (CVSS: 0.0)


NVT: elFinder Detection (HTTP)

Summary
HTTP based detection of elFinder.

Quality of Detection: 80
Vulnerability Detection Result
Detected elFinder
Version: unknown
Location: /
CPE: cpe:/a:std42:elfinder

Solution:

Log Method
Details: elFinder Detection (HTTP)
OID:1.3.6.1.4.1.25623.1.0.113323
Version used: 2023-03-01T10:20:05Z
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 12

. . . continued from previous page . . .

References
url: https://studio-42.github.io/elFinder/

Log (CVSS: 0.0)


NVT: HTTP Security Headers Detection

Summary
All known security headers are being checked on the remote web server.
On completion a report will hand back whether a specic security header has been implemented
(including its value and if it is deprecated) or is missing on the target.

Quality of Detection: 80
Vulnerability Detection Result
Missing Headers | More Information
--------------------------------------------------------------------------------
,→------------------------------------------------------------------------------
,→------------------------------------------------------------------------------
,→----------
Content-Security-Policy | https://owasp.org/www-project-secure-headers
,→/#content-security-policy
Cross-Origin-Embedder-Policy | https://scotthelme.co.uk/coop-and-coep/, Not
,→e: This is an upcoming header
Cross-Origin-Opener-Policy | https://scotthelme.co.uk/coop-and-coep/, Not
,→e: This is an upcoming header
Cross-Origin-Resource-Policy | https://scotthelme.co.uk/coop-and-coep/, Not
,→e: This is an upcoming header
Document-Policy | https://w3c.github.io/webappsec-feature-poli
,→cy/document-policy#document-policy-http-header
Expect-CT | https://owasp.org/www-project-secure-headers
,→/#expect-ct, Note: This is an upcoming header
Feature-Policy | https://owasp.org/www-project-secure-headers
,→/#feature-policy, Note: The Feature Policy header has been renamed to Permissi
,→ons Policy
Permissions-Policy | https://w3c.github.io/webappsec-feature-poli
,→cy/#permissions-policy-http-header-field
Public-Key-Pins | Please check the output of the VTs including
,→ 'SSL/TLS:' and 'HPKP' in their name for more information and configuration he
,→lp. Note: Most major browsers have dropped / deprecated support for this heade
,→r in 2020.
Referrer-Policy | https://owasp.org/www-project-secure-headers
,→/#referrer-policy
Sec-Fetch-Dest | https://developer.mozilla.org/en-US/docs/Web
,→/HTTP/Headers#fetch_metadata_request_headers, Note: This is a new header suppo
,→rted only in newer browsers like e.g. Firefox 90
Sec-Fetch-Mode | https://developer.mozilla.org/en-US/docs/Web
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 13

. . . continued from previous page . . .


,→/HTTP/Headers#fetch_metadata_request_headers, Note: This is a new header suppo
,→rted only in newer browsers like e.g. Firefox 90
Sec-Fetch-Site | https://developer.mozilla.org/en-US/docs/Web
,→/HTTP/Headers#fetch_metadata_request_headers, Note: This is a new header suppo
,→rted only in newer browsers like e.g. Firefox 90
Sec-Fetch-User | https://developer.mozilla.org/en-US/docs/Web
,→/HTTP/Headers#fetch_metadata_request_headers, Note: This is a new header suppo
,→rted only in newer browsers like e.g. Firefox 90
Strict-Transport-Security | Please check the output of the VTs including
,→ 'SSL/TLS:' and 'HSTS' in their name for more information and configuration he
,→lp.
X-Content-Type-Options | https://owasp.org/www-project-secure-headers
,→/#x-content-type-options
X-Frame-Options | https://owasp.org/www-project-secure-headers
,→/#x-frame-options
X-Permitted-Cross-Domain-Policies | https://owasp.org/www-project-secure-headers
,→/#x-permitted-cross-domain-policies
X-XSS-Protection | https://owasp.org/www-project-secure-headers
,→/#x-xss-protection, Note: Most major browsers have dropped / deprecated suppor
,→t for this header in 2020.

Solution:

Log Method
Details: HTTP Security Headers Detection
OID:1.3.6.1.4.1.25623.1.0.112081
Version used: 2021-07-14T06:19:43Z

References
url: https://owasp.org/www-project-secure-headers/
url: https://owasp.org/www-project-secure-headers/#div-headers
url: https://securityheaders.com/

Log (CVSS: 0.0)


NVT: robot.txt / robots.txt exists on the Web Server (HTTP)

Summary
Web Servers can use a le called /robot(s).txt to ask search engines to ignore certain les and
directories. By nature this le can not be used to protect private les from public read access.

Quality of Detection: 80
Vulnerability Detection Result
The file 'https://www.unisoftindia.org:2096/robots.txt' contains the following:
User-agent: *
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 14

. . . continued from previous page . . .


Disallow: /

Solution:
Solution type: Mitigation
Review the content of the /robot(s).txt le and consider removing the les from the server or
protect them in other ways in case you actually intended non-public availability.

Vulnerability Insight
Any serious web search engine will honor the /robot(s).txt le and not scan the les and direc-
tories listed there.
Any entries listed in this le are not even hidden anymore.

Log Method
Details: robot.txt / robots.txt exists on the Web Server (HTTP)
OID:1.3.6.1.4.1.25623.1.0.10302
Version used: 2024-02-26T14:36:40Z

References
url: https://www.robotstxt.org/
url: https://www.robotstxt.org/norobots-rfc.txt

Log (CVSS: 0.0)


NVT: Services

Summary
This plugin performs service detection.

Quality of Detection: 80
Vulnerability Detection Result
A TLScustom server answered on this port

Solution:

Vulnerability Insight
This plugin attempts to guess which service is running on the remote port(s). For instance,
it searches for a web server which could listen on another port than 80 or 443 and makes this
information available for other check routines.

Log Method
Details: Services
OID:1.3.6.1.4.1.25623.1.0.10330
Version used: 2023-06-14T05:05:19Z

Generated by HostedScan
2 RESULTS PER HOST 15

Log (CVSS: 0.0)


NVT: Services

Summary
This plugin performs service detection.

Quality of Detection: 80
Vulnerability Detection Result
A web server is running on this port through SSL

Solution:

Vulnerability Insight
This plugin attempts to guess which service is running on the remote port(s). For instance,
it searches for a web server which could listen on another port than 80 or 443 and makes this
information available for other check routines.

Log Method
Details: Services
OID:1.3.6.1.4.1.25623.1.0.10330
Version used: 2023-06-14T05:05:19Z

Log (CVSS: 0.0)


NVT: SSL/TLS: Collect and Report Certicate Details

Summary
This script collects and reports the details of all SSL/TLS certicates.
This data will be used by other tests to verify server certicates.

Quality of Detection: 98
Vulnerability Detection Result
The following certificate details of the remote service were collected.
Certificate details:
fingerprint (SHA-1) | B84E1827B136A8486244AEEE4F16AE2670E6DA49
fingerprint (SHA-256) | 28AB1C338D758F90F3B028FEE86033C303C5B11A3A0D19
,→598AA913C6D27DE14A
issued by | CN=Go Daddy Secure Certificate Authority - G2,
,→OU=http://certs.godaddy.com/repository/,O=GoDaddy.com\, Inc.,L=Scottsdale,ST=A
,→rizona,C=US
public key size (bits) | 2048
serial | 64BBBEECF3D5182D
signature algorithm | sha256WithRSAEncryption
subject | CN=unisoftindia.org
subject alternative names (SAN) | unisoftindia.org, www.unisoftindia.org
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 16

. . . continued from previous page . . .


valid from | 2024-05-01 10:56:00 UTC
valid until | 2025-05-01 10:43:30 UTC

Solution:

Log Method
Details: SSL/TLS: Collect and Report Certificate Details
OID:1.3.6.1.4.1.25623.1.0.103692
Version used: 2024-06-14T05:05:48Z

Log (CVSS: 0.0)


NVT: SSL/TLS: HTTP Public Key Pinning (HPKP) Missing

Summary
The remote web server is not enforcing HTTP Public Key Pinning (HPKP).
Note: Most major browsers have dropped / deprecated support for this header in 2020.

Quality of Detection: 80
Vulnerability Detection Result
The remote web server is not enforcing HPKP.
HTTP-Banner:
HTTP/1.1 200 OK
Connection: close
Content-Type: text/html; charset="utf-8"
Date: ***replaced***
Cache-Control: no-cache, no-store, must-revalidate, private
Pragma: no-cache
Set-Cookie: ***replaced***
Set-Cookie: ***replaced***
Set-Cookie: ***replaced***
Set-Cookie: ***replaced***
Set-Cookie: ***replaced***
Set-Cookie: ***replaced***
Cache-Control: no-cache, no-store, must-revalidate, private
Content-Length: ***replaced***

Solution:
Solution type: Workaround
Enable HPKP or add / congure the required directives correctly following the guides linked in
the references.
Note: Some web servers are not sending headers on specic status codes by default. Please review
your web server or application conguration to always send these headers on every response
independently from the status code.
- Apache: Use 'Header always set' instead of 'Header set'.
- nginx: Append the 'always' keyword to each 'add_header' directive.
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 17

. . . continued from previous page . . .


For dierent applications or web severs please refer to the related documentation for a similar
conguration possibility.

Log Method
Details: SSL/TLS: HTTP Public Key Pinning (HPKP) Missing
OID:1.3.6.1.4.1.25623.1.0.108247
Version used: 2024-02-08T05:05:59Z

References
url: https://owasp.org/www-project-secure-headers/
url: https://owasp.org/www-project-secure-headers/#public-key-pinning-extension-
,→for-http-hpkp
url: https://tools.ietf.org/html/rfc7469
url: https://securityheaders.io/
url: https://httpd.apache.org/docs/current/mod/mod_headers.html#header
url: https://nginx.org/en/docs/http/ngx_http_headers_module.html#add_header

Log (CVSS: 0.0)


NVT: SSL/TLS: HTTP Strict Transport Security (HSTS) Missing

Summary
The remote web server is not enforcing HTTP Strict Transport Security (HSTS).

Quality of Detection: 80
Vulnerability Detection Result
The remote web server is not enforcing HSTS.
HTTP-Banner:
HTTP/1.1 200 OK
Connection: close
Content-Type: text/html; charset="utf-8"
Date: ***replaced***
Cache-Control: no-cache, no-store, must-revalidate, private
Pragma: no-cache
Set-Cookie: ***replaced***
Set-Cookie: ***replaced***
Set-Cookie: ***replaced***
Set-Cookie: ***replaced***
Set-Cookie: ***replaced***
Set-Cookie: ***replaced***
Cache-Control: no-cache, no-store, must-revalidate, private
Content-Length: ***replaced***

Solution:
Solution type: Workaround
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 18

. . . continued from previous page . . .


Enable HSTS or add / congure the required directives correctly following the guides linked in
the references.
Note: Some web servers are not sending headers on specic status codes by default. Please review
your web server or application conguration to always send these headers on every response
independently from the status code.
- Apache: Use 'Header always set' instead of 'Header set'.
- nginx: Append the 'always' keyword to each 'add_header' directive.
For dierent applications or web severs please refer to the related documentation for a similar
conguration possibility.

Log Method
Details: SSL/TLS: HTTP Strict Transport Security (HSTS) Missing
OID:1.3.6.1.4.1.25623.1.0.105879
Version used: 2024-02-08T05:05:59Z

References
url: https://owasp.org/www-project-secure-headers/
url: https://owasp.org/www-project-cheat-sheets/cheatsheets/HTTP_Strict_Transpor
,→t_Security_Cheat_Sheet.html
url: https://owasp.org/www-project-secure-headers/#http-strict-transport-securit
,→y-hsts
url: https://tools.ietf.org/html/rfc6797
url: https://securityheaders.io/
url: https://httpd.apache.org/docs/current/mod/mod_headers.html#header
url: https://nginx.org/en/docs/http/ngx_http_headers_module.html#add_header

Log (CVSS: 0.0)


NVT: SSL/TLS: Report Medium Cipher Suites

Summary
This routine reports all Medium SSL/TLS cipher suites accepted by a service.

Quality of Detection: 98
Vulnerability Detection Result
'Medium' cipher suites accepted by this service via the TLSv1.2 protocol:
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
'Medium' cipher suites accepted by this service via the TLSv1.3 protocol:
TLS_AES_128_CCM_SHA256
TLS_AES_128_GCM_SHA256

Solution:
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 19

. . . continued from previous page . . .

Vulnerability Insight
Any cipher suite considered to be secure for only the next 10 years is considered as medium.

Log Method
Details: SSL/TLS: Report Medium Cipher Suites
OID:1.3.6.1.4.1.25623.1.0.902816
Version used: 2024-06-14T05:05:48Z

Log (CVSS: 0.0)


NVT: SSL/TLS: Report Non Weak Cipher Suites

Summary
This routine reports all Non Weak SSL/TLS cipher suites accepted by a service.

Quality of Detection: 98
Vulnerability Detection Result
'Non Weak' cipher suites accepted by this service via the TLSv1.2 protocol:
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
'Non Weak' cipher suites accepted by this service via the TLSv1.3 protocol:
TLS_AES_128_CCM_SHA256
TLS_AES_128_GCM_SHA256
TLS_AES_256_GCM_SHA384
TLS_CHACHA20_POLY1305_SHA256

Solution:

Log Method
Details: SSL/TLS: Report Non Weak Cipher Suites
OID:1.3.6.1.4.1.25623.1.0.103441
Version used: 2024-06-14T05:05:48Z

Log (CVSS: 0.0)


NVT: SSL/TLS: Report Perfect Forward Secrecy (PFS) Cipher Suites

Summary
This routine reports all SSL/TLS cipher suites accepted by a service which are supporting Perfect
Forward Secrecy (PFS).
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 20

. . . continued from previous page . . .

Quality of Detection: 98
Vulnerability Detection Result
Cipher suites supporting Perfect Forward Secrecy (PFS) are accepted by this serv
,→ice via the TLSv1.2 protocol:
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
Cipher suites supporting Perfect Forward Secrecy (PFS) are accepted by this serv
,→ice via the TLSv1.3 protocol:
TLS_AES_128_CCM_SHA256
TLS_AES_128_GCM_SHA256
TLS_AES_256_GCM_SHA384
TLS_CHACHA20_POLY1305_SHA256

Solution:

Log Method
Details: SSL/TLS: Report Perfect Forward Secrecy (PFS) Cipher Suites
OID:1.3.6.1.4.1.25623.1.0.105018
Version used: 2024-06-14T05:05:48Z

Log (CVSS: 0.0)


NVT: SSL/TLS: Report Supported Cipher Suites

Summary
This routine reports all SSL/TLS cipher suites accepted by a service.

Quality of Detection: 98
Vulnerability Detection Result
'Strong' cipher suites accepted by this service via the TLSv1.2 protocol:
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
'Medium' cipher suites accepted by this service via the TLSv1.2 protocol:
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
No 'Weak' cipher suites accepted by this service via the TLSv1.2 protocol.
No 'Null' cipher suites accepted by this service via the TLSv1.2 protocol.
No 'Anonymous' cipher suites accepted by this service via the TLSv1.2 protocol.
'Strong' cipher suites accepted by this service via the TLSv1.3 protocol:
TLS_AES_256_GCM_SHA384
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 21

. . . continued from previous page . . .


TLS_CHACHA20_POLY1305_SHA256
'Medium' cipher suites accepted by this service via the TLSv1.3 protocol:
TLS_AES_128_CCM_SHA256
TLS_AES_128_GCM_SHA256
No 'Weak' cipher suites accepted by this service via the TLSv1.3 protocol.
No 'Null' cipher suites accepted by this service via the TLSv1.3 protocol.
No 'Anonymous' cipher suites accepted by this service via the TLSv1.3 protocol.

Solution:

Vulnerability Insight
Notes:
- As the VT 'SSL/TLS: Check Supported Cipher Suites' (OID: 1.3.6.1.4.1.25623.1.0.900234)
might run into a timeout the actual reporting of all accepted cipher suites takes place in this VT
instead.
- SSLv2 ciphers are not getting reported as the protocol itself is deprecated, needs to be considered
as weak and is reported separately as deprecated.

Log Method
Details: SSL/TLS: Report Supported Cipher Suites
OID:1.3.6.1.4.1.25623.1.0.802067
Version used: 2024-06-14T05:05:48Z

Log (CVSS: 0.0)


NVT: SSL/TLS: Version Detection

Summary
Enumeration and reporting of SSL/TLS protocol versions supported by a remote service.

Quality of Detection: 80
Vulnerability Detection Result
The remote SSL/TLS service supports the following SSL/TLS protocol version(s):
TLSv1.2
TLSv1.3

Solution:

Log Method
Sends multiple connection requests to the remote service and attempts to determine the SSL/TLS
protocol versions supported by the service from the replies.
Note: The supported SSL/TLS protocol versions included in the report of this VT are reported
independently from the allowed / supported SSL/TLS ciphers.
Details: SSL/TLS: Version Detection
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 22

. . . continued from previous page . . .


OID:1.3.6.1.4.1.25623.1.0.105782
Version used: 2024-06-14T05:05:48Z

Log (CVSS: 0.0)


NVT: Web Application Scanning Consolidation / Info Reporting

Summary
The script consolidates and reports various information for web application (formerly called
'CGI') scanning.
This information is based on the following scripts / settings:
- HTTP-Version Detection (OID: 1.3.6.1.4.1.25623.1.0.100034)
- No 404 check (OID: 1.3.6.1.4.1.25623.1.0.10386)
- Web mirroring / webmirror.nasl (OID: 1.3.6.1.4.1.25623.1.0.10662)
- Directory Scanner / DDI_Directory_Scanner.nasl (OID: 1.3.6.1.4.1.25623.1.0.11032)
- The congured 'cgi_path' within the 'Scanner Preferences' of the scan cong in use
- The congured 'Enable CGI scanning', 'Enable generic web application scanning' and 'Add
historic /scripts and /cgi-bin to directories for CGI scanning' within the 'Global variable settings'
of the scan cong in use
If you think any of this information is wrong please report it to the referenced community forum.

Quality of Detection: 80
Vulnerability Detection Result
The Hostname/IP "www.unisoftindia.org" was used to access the remote host.
Generic web application scanning is disabled for this host via the "Enable gener
,→ic web application scanning" option within the "Global variable settings" of t
,→he scan config in use.
Requests to this service are done via HTTP/1.1.
This service seems to be able to host PHP scripts.
This service seems to be able to host ASP scripts.
The User-Agent "Mozilla/5.0 [en] (X11, U; OpenVAS-VT 21.4.3)" was used to access
,→ the remote host.
Historic /scripts and /cgi-bin are not added to the directories used for web app
,→lication scanning. You can enable this again with the "Add historic /scripts a
,→nd /cgi-bin to directories for CGI scanning" option within the "Global variabl
,→e settings" of the scan config in use.
The following directories were used for web application scanning:
https://www.unisoftindia.org:2096/
While this is not, in and of itself, a bug, you should manually inspect these di
,→rectories to ensure that they are in compliance with company security standard
,→s

Solution:

Log Method
Details: Web Application Scanning Consolidation / Info Reporting
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 23

. . . continued from previous page . . .


OID:1.3.6.1.4.1.25623.1.0.111038
Version used: 2024-07-03T06:48:05Z

References
url: https://forum.greenbone.net/c/vulnerability-tests/7

[ return to 43.255.154.27 ]

2.1.8 Log 2095/tcp

Log (CVSS: 0.0)


NVT: Response Time / No 404 Error Code Check

Summary
This VT tests if the remote web server does not reply with a 404 error code and checks if it is
replying to the scanners requests in a reasonable amount of time.

Quality of Detection: 80
Vulnerability Detection Result
The remote web server is very slow - it took 63 seconds (Maximum response time c
,→onfigured in 'Response Time / No 404 Error Code Check' (OID: 1.3.6.1.4.1.25623
,→.1.0.10386) preferences: 60 seconds) to execute the plugin no404.nasl (it usua
,→lly only takes a few seconds).
In order to keep the scan total time to a reasonable amount, the remote web serv
,→er has not been tested.
If the remote server should be tested it has to be fixed to have it reply to the
,→ scanners requests in a reasonable amount of time. Alternatively the 'Maximum
,→response time (in seconds)' preference could be raised to a higher value if lo
,→nger scan times are accepted.

Solution:

Vulnerability Insight
This web server might show the following issues:
- it is [mis]congured in that it does not return '404 Not Found' error codes when a non-existent
le is requested, perhaps returning a site map, search page, authentication page or redirect
instead.
The Scanner might enabled some counter measures for that, however they might be insucient.
If a great number of security issues are reported for this port, they might not all be accurate.
- it doesn't response in a reasonable amount of time to various HTTP requests sent by this VT.
In order to keep the scan total time to a reasonable amount, the remote web server might not be
tested. If the remote server should be tested it has to be xed to have it reply to the scanners
requests in a reasonable amount of time.
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 24

. . . continued from previous page . . .


Alternatively the 'Maximum response time (in seconds)' preference could be raised to a higher
value if longer scan times are accepted.

Log Method
Details: Response Time / No 404 Error Code Check
OID:1.3.6.1.4.1.25623.1.0.10386
Version used: 2023-07-07T05:05:26Z

Log (CVSS: 0.0)


NVT: Response Time / No 404 Error Code Check

Summary
This VT tests if the remote web server does not reply with a 404 error code and checks if it is
replying to the scanners requests in a reasonable amount of time.

Quality of Detection: 80
Vulnerability Detection Result
The host returns a 30x (e.g. 301) error code when a non-existent file is request
,→ed. Some HTTP-related checks have been disabled.

Solution:

Vulnerability Insight
This web server might show the following issues:
- it is [mis]congured in that it does not return '404 Not Found' error codes when a non-existent
le is requested, perhaps returning a site map, search page, authentication page or redirect
instead.
The Scanner might enabled some counter measures for that, however they might be insucient.
If a great number of security issues are reported for this port, they might not all be accurate.
- it doesn't response in a reasonable amount of time to various HTTP requests sent by this VT.
In order to keep the scan total time to a reasonable amount, the remote web server might not be
tested. If the remote server should be tested it has to be xed to have it reply to the scanners
requests in a reasonable amount of time.
Alternatively the 'Maximum response time (in seconds)' preference could be raised to a higher
value if longer scan times are accepted.

Log Method
Details: Response Time / No 404 Error Code Check
OID:1.3.6.1.4.1.25623.1.0.10386
Version used: 2023-07-07T05:05:26Z

. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 25

. . . continued from previous page . . .

Log (CVSS: 0.0)


NVT: Services

Summary
This plugin performs service detection.

Quality of Detection: 80
Vulnerability Detection Result
A web server is running on this port

Solution:

Vulnerability Insight
This plugin attempts to guess which service is running on the remote port(s). For instance,
it searches for a web server which could listen on another port than 80 or 443 and makes this
information available for other check routines.

Log Method
Details: Services
OID:1.3.6.1.4.1.25623.1.0.10330
Version used: 2023-06-14T05:05:19Z

Log (CVSS: 0.0)


NVT: Web Application Scanning Consolidation / Info Reporting

Summary
The script consolidates and reports various information for web application (formerly called
'CGI') scanning.
This information is based on the following scripts / settings:
- HTTP-Version Detection (OID: 1.3.6.1.4.1.25623.1.0.100034)
- No 404 check (OID: 1.3.6.1.4.1.25623.1.0.10386)
- Web mirroring / webmirror.nasl (OID: 1.3.6.1.4.1.25623.1.0.10662)
- Directory Scanner / DDI_Directory_Scanner.nasl (OID: 1.3.6.1.4.1.25623.1.0.11032)
- The congured 'cgi_path' within the 'Scanner Preferences' of the scan cong in use
- The congured 'Enable CGI scanning', 'Enable generic web application scanning' and 'Add
historic /scripts and /cgi-bin to directories for CGI scanning' within the 'Global variable settings'
of the scan cong in use
If you think any of this information is wrong please report it to the referenced community forum.

Quality of Detection: 80
Vulnerability Detection Result
The Hostname/IP "www.unisoftindia.org" was used to access the remote host.
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 26

. . . continued from previous page . . .


Generic web application scanning is disabled for this host via the "Enable gener
,→ic web application scanning" option within the "Global variable settings" of t
,→he scan config in use.
This service is marked as broken and no web application scanning is launched aga
,→inst it. Reason(s):
-----
- The remote web server is very slow - it took 63 seconds (Maximum response tim
,→e configured in 'Response Time / No 404 Error Code Check' (OID: 1.3.6.1.4.1.25
,→623.1.0.10386) preferences: 60 seconds) to execute the plugin no404.nasl (it u
,→sually only takes a few seconds).
In order to keep the scan total time to a reasonable amount, the remote web serv
,→er has not been tested.
If the remote server should be tested it has to be fixed to have it reply to the
,→ scanners requests in a reasonable amount of time. Alternatively the 'Maximum
,→response time (in seconds)' preference could be raised to a higher value if lo
,→nger scan times are accepted.
-----
Requests to this service are done via HTTP/1.1.
This service seems to be able to host PHP scripts.
This service seems to be able to host ASP scripts.
The User-Agent "Mozilla/5.0 [en] (X11, U; OpenVAS-VT 21.4.3)" was used to access
,→ the remote host.
Historic /scripts and /cgi-bin are not added to the directories used for web app
,→lication scanning. You can enable this again with the "Add historic /scripts a
,→nd /cgi-bin to directories for CGI scanning" option within the "Global variabl
,→e settings" of the scan config in use.
The following directories were used for web application scanning:
http://www.unisoftindia.org:2095/
While this is not, in and of itself, a bug, you should manually inspect these di
,→rectories to ensure that they are in compliance with company security standard
,→s

Solution:

Log Method
Details: Web Application Scanning Consolidation / Info Reporting
OID:1.3.6.1.4.1.25623.1.0.111038
Version used: 2024-07-03T06:48:05Z

References
url: https://forum.greenbone.net/c/vulnerability-tests/7

[ return to 43.255.154.27 ]

2.1.9 Log 110/tcp

Generated by HostedScan
2 RESULTS PER HOST 27

Log (CVSS: 0.0)


NVT: POP3 Server type and version

Summary
This detects the POP3 Server's type and version by connecting to the server and processing the
received banner.

Quality of Detection: 80
Vulnerability Detection Result
Remote POP3 server banner:
+OK Dovecot ready.
This is probably:
- Dovecot
The remote POP3 server is announcing the following available CAPABILITIES via an
,→ unencrypted connection:
AUTH-RESP-CODE, CAPA, PIPELINING, RESP-CODES, SASL PLAIN LOGIN, STLS, TOP, UIDL,
,→ USER

Solution:

Log Method
Details: POP3 Server type and version
OID:1.3.6.1.4.1.25623.1.0.10185
Version used: 2023-08-01T13:29:10Z

Log (CVSS: 0.0)


NVT: Services

Summary
This plugin performs service detection.

Quality of Detection: 80
Vulnerability Detection Result
A pop3 server is running on this port

Solution:

Vulnerability Insight
This plugin attempts to guess which service is running on the remote port(s). For instance,
it searches for a web server which could listen on another port than 80 or 443 and makes this
information available for other check routines.

Log Method
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 28

. . . continued from previous page . . .


Details: Services
OID:1.3.6.1.4.1.25623.1.0.10330
Version used: 2023-06-14T05:05:19Z

Log (CVSS: 0.0)


NVT: SSL/TLS: POP3 'STLS' Command Detection

Summary
Checks if the remote POP3 server supports SSL/TLS with the 'STLS' command.

Quality of Detection: 80
Vulnerability Detection Result
The remote POP3 server supports SSL/TLS with the 'STLS' command.
The remote POP3 server is announcing the following CAPABILITIES before sending t
,→he 'STLS' command:
AUTH-RESP-CODE, CAPA, PIPELINING, RESP-CODES, SASL PLAIN LOGIN, STLS, TOP, UIDL,
,→ USER
The remote POP3 server is announcing the following CAPABILITIES after sending th
,→e 'STLS' command:
AUTH-RESP-CODE, CAPA, PIPELINING, RESP-CODES, SASL PLAIN LOGIN, TOP, UIDL, USER

Solution:

Log Method
Details: SSL/TLS: POP3 'STLS' Command Detection
OID:1.3.6.1.4.1.25623.1.0.105008
Version used: 2021-11-12T09:42:39Z

References
url: https://tools.ietf.org/html/rfc2595

[ return to 43.255.154.27 ]

2.1.10 Log 3306/tcp

Log (CVSS: 0.0)


NVT: Database Open Access Information Disclosure Vulnerability

Summary
Various Database server might be prone to an information disclosure vulnerability if accessible
to remote systems.

Quality of Detection: 80
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 29

. . . continued from previous page . . .

Vulnerability Detection Result


MariaDB can be accessed by remote attackers

Impact
Successful exploitation could allow an attacker to obtain sensitive information from the database.

Solution:
Solution type: Workaround
Restrict database access to remote systems. Please see the manual of the aected database server
for more information.

Aected Software/OS
- Oracle MySQL
- MariaDB
- IBM DB2
- PostgreSQL
- IBM solidDB
- Oracle Database
- Microsoft SQL Server

Vulnerability Insight
The remote database server is not restricting direct access from remote systems.

Log Method
Checks the result of various database server detections and evaluates their results.
Details: Database Open Access Information Disclosure Vulnerability
OID:1.3.6.1.4.1.25623.1.0.902799
Version used: 2024-06-20T05:05:33Z

References
url: https://www.pcisecuritystandards.org/security_standards/index.php?id=pci_ds
,→s_v1-2.pdf

Log (CVSS: 0.0)


NVT: MariaDB / Oracle MySQL Detection (MySQL Protocol)

Summary
MySQL protocol-based detection of MariaDB / Oracle MySQL.

Quality of Detection: 80
Vulnerability Detection Result
Detected MariaDB
Version: 10.6.18
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 30

. . . continued from previous page . . .


Location: 3306/tcp
CPE: cpe:/a:mariadb:mariadb:10.6.18
Concluded from version/product identification result:
5.5.5-10.6.18-MariaDB-cll-lve

Solution:

Log Method
Details: MariaDB / Oracle MySQL Detection (MySQL Protocol)
OID:1.3.6.1.4.1.25623.1.0.100152
Version used: 2024-02-19T14:37:31Z

Log (CVSS: 0.0)


NVT: Services

Summary
This plugin performs service detection.

Quality of Detection: 80
Vulnerability Detection Result
A MySQL server is running on this port

Solution:

Vulnerability Insight
This plugin attempts to guess which service is running on the remote port(s). For instance,
it searches for a web server which could listen on another port than 80 or 443 and makes this
information available for other check routines.

Log Method
Details: Services
OID:1.3.6.1.4.1.25623.1.0.10330
Version used: 2023-06-14T05:05:19Z

[ return to 43.255.154.27 ]

2.1.11 Log general/tcp

Log (CVSS: 0.0)


NVT: Apache HTTP Server Detection Consolidation

Summary
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 31

. . . continued from previous page . . .


Consolidation of Apache HTTP Server detections.

Quality of Detection: 80
Vulnerability Detection Result
Detected Apache HTTP Server
Version: unknown
Location: 443/tcp
CPE: cpe:/a:apache:http_server
Concluded from version/product identification result:
Server: Apache
Detected Apache HTTP Server
Version: unknown
Location: 80/tcp
CPE: cpe:/a:apache:http_server
Concluded from version/product identification result:
Server: Apache

Solution:

Log Method
Details: Apache HTTP Server Detection Consolidation
OID:1.3.6.1.4.1.25623.1.0.117232
Version used: 2024-03-08T15:37:10Z

References
url: https://httpd.apache.org

Log (CVSS: 0.0)


NVT: Dovecot Detection Consolidation

Summary
Consolidation of Dovecot detections.

Quality of Detection: 80
Vulnerability Detection Result
Detected Dovecot
Version: unknown
Location: 143/tcp
CPE: cpe:/a:dovecot:dovecot
Concluded from version/product identification result:
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE NAMESPACE LITE
,→RAL+ STARTTLS AUTH=PLAIN AUTH=LOGIN] Dovecot ready.
* ID ("name" "Dovecot")
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 32

. . . continued from previous page . . .


Detection Method: IMAP Banner
Detected Dovecot
Version: unknown
Location: 993/tcp
CPE: cpe:/a:dovecot:dovecot
Concluded from version/product identification result:
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE NAMESPACE LITE
,→RAL+ AUTH=PLAIN AUTH=LOGIN] Dovecot ready.
* ID ("name" "Dovecot")
Detection Method: IMAP Banner
Detected Dovecot
Version: unknown
Location: 110/tcp
CPE: cpe:/a:dovecot:dovecot
Concluded from version/product identification result:
+OK Dovecot ready.
Detection Method: POP3 Banner
Detected Dovecot
Version: unknown
Location: 995/tcp
CPE: cpe:/a:dovecot:dovecot
Concluded from version/product identification result:
+OK Dovecot ready.
Detection Method: POP3 Banner

Solution:

Log Method
Details: Dovecot Detection Consolidation
OID:1.3.6.1.4.1.25623.1.0.113212
Version used: 2022-01-18T12:57:07Z

References
url: https://www.dovecot.org/

Log (CVSS: 0.0)


NVT: jQuery Detection Consolidation

Summary
Consolidation of jQuery detections.

Quality of Detection: 80
Vulnerability Detection Result
Detected jQuery
Version: unknown
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 33

. . . continued from previous page . . .


Location: Externally hosted
CPE: cpe:/a:jquery:jquery
Concluded from version/product identification result:
src="https://www.unisoftindia.org/public/vendor/jquery/jquery.min.js
Concluded from version/product identification location:
- Identified file: src="https://www.unisoftindia.org/public/vendor/jquery/jquery
,→.min.js
- Referenced at: https://www.unisoftindia.org/
Extra information:
The jQuery library is hosted on a different server. Because of this it is not po
,→ssible to gather the version by a direct file access. Please manually inspect
,→the version which gets included on this web page.
Detected jQuery
Version: unknown
Location: Externally hosted
CPE: cpe:/a:jquery:jquery
Concluded from version/product identification result:
src="http://www.unisoftindia.org/public/vendor/jquery/jquery.min.js
Concluded from version/product identification location:
- Identified file: src="http://www.unisoftindia.org/public/vendor/jquery/jquery.
,→min.js
- Referenced at: http://www.unisoftindia.org/
Extra information:
The jQuery library is hosted on a different server. Because of this it is not po
,→ssible to gather the version by a direct file access. Please manually inspect
,→the version which gets included on this web page.

Solution:

Log Method
Details: jQuery Detection Consolidation
OID:1.3.6.1.4.1.25623.1.0.150658
Version used: 2023-07-14T05:06:08Z

References
url: https://jquery.com/

Log (CVSS: 0.0)


NVT: OpenSSH Detection Consolidation

Summary
Consolidation of OpenSSH detections.

Quality of Detection: 80
Vulnerability Detection Result
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 34

. . . continued from previous page . . .


Detected OpenSSH Server
Version: 8.0
Location: 22/tcp
CPE: cpe:/a:openbsd:openssh:8.0
Concluded from version/product identification result:
SSH-2.0-OpenSSH_8.0

Solution:

Log Method
Details: OpenSSH Detection Consolidation
OID:1.3.6.1.4.1.25623.1.0.108577
Version used: 2022-03-28T10:48:38Z

References
url: https://www.openssh.com/

Log (CVSS: 0.0)


NVT: OS Detection Consolidation and Reporting

Summary
This script consolidates the OS information detected by several VTs and tries to nd the best
matching OS.
Furthermore it reports all previously collected information leading to this best matching OS. It
also reports possible additional information which might help to improve the OS detection.
If any of this information is wrong or could be improved please consider to report these to the
referenced community forum.

Quality of Detection: 80
Vulnerability Detection Result
Best matching OS:
OS: Linux/Unix
CPE: cpe:/o:linux:kernel
Found by VT: 1.3.6.1.4.1.25623.1.0.105355 (Operating System (OS) Detection (FTP
,→))
Concluded from FTP banner on port 21/tcp: 220---------- Welcome to Pure-FTPd [pr
,→ivsep] [TLS] ----------
220-You are user number 2 of 50 allowed.
220-Local time is now 08:07. Server port: 21.
220-This is a private system - No anonymous login
220-IPv6 connections are also welcome on this server.
220 You will be disconnected after 15 minutes of inactivity.
Setting key "Host/runs_unixoide" based on this information
Other OS detections (in order of reliability):
OS: Linux/Unix
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 35

. . . continued from previous page . . .


CPE: cpe:/o:linux:kernel
Found by VT: 1.3.6.1.4.1.25623.1.0.111067 (Operating System (OS) Detection (HTT
,→P))
Concluded from HTTP Server banner on port 2078/tcp: Server: cPanel
OS: Linux/Unix
CPE: cpe:/o:linux:kernel
Found by VT: 1.3.6.1.4.1.25623.1.0.111067 (Operating System (OS) Detection (HTT
,→P))
Concluded from HTTP Server banner on port 2077/tcp: Server: cPanel
OS: Linux/Unix
CPE: cpe:/o:linux:kernel
Found by VT: 1.3.6.1.4.1.25623.1.0.111068 (Operating System (OS) Detection (SMT
,→P/POP3/IMAP))
Concluded from IMAP banner on port 143/tcp: * OK [CAPABILITY IMAP4rev1 SASL-IR L
,→OGIN-REFERRALS ID ENABLE IDLE NAMESPACE LITERAL+ STARTTLS AUTH=PLAIN AUTH=LOGI
,→N] Dovecot ready.
* ID ("name" "Dovecot")
OS: Linux/Unix
CPE: cpe:/o:linux:kernel
Found by VT: 1.3.6.1.4.1.25623.1.0.111068 (Operating System (OS) Detection (SMT
,→P/POP3/IMAP))
Concluded from POP3 banner on port 995/tcp: +OK Dovecot ready.
OS: Linux/Unix
CPE: cpe:/o:linux:kernel
Found by VT: 1.3.6.1.4.1.25623.1.0.111068 (Operating System (OS) Detection (SMT
,→P/POP3/IMAP))
Concluded from IMAP banner on port 993/tcp: * OK [CAPABILITY IMAP4rev1 SASL-IR L
,→OGIN-REFERRALS ID ENABLE IDLE NAMESPACE LITERAL+ AUTH=PLAIN AUTH=LOGIN] Doveco
,→t ready.
* ID ("name" "Dovecot")
OS: Linux/Unix
CPE: cpe:/o:linux:kernel
Found by VT: 1.3.6.1.4.1.25623.1.0.111068 (Operating System (OS) Detection (SMT
,→P/POP3/IMAP))
Concluded from POP3 banner on port 110/tcp: +OK Dovecot ready.

Solution:

Log Method
Details: OS Detection Consolidation and Reporting
OID:1.3.6.1.4.1.25623.1.0.105937
Version used: 2024-07-04T05:05:37Z

References
url: https://forum.greenbone.net/c/vulnerability-tests/7

Generated by HostedScan
2 RESULTS PER HOST 36

Log (CVSS: 0.0)


NVT: SSL/TLS: Hostname discovery from server certicate

Summary
It was possible to discover an additional hostname of this server from its certicate Common or
Subject Alt Name.

Quality of Detection: 98
Vulnerability Detection Result
The following additional and resolvable hostnames were detected:
unisoftindia.org
The following additional but not resolvable hostnames were detected:
prod.sin2.secureserver.net

Solution:

Log Method
Details: SSL/TLS: Hostname discovery from server certificate
OID:1.3.6.1.4.1.25623.1.0.111010
Version used: 2021-11-22T15:32:39Z

Log (CVSS: 0.0)


NVT: Traceroute

Summary
Collect information about the network route and network distance between the scanner host and
the target host.

Quality of Detection: 80
Vulnerability Detection Result
Network route from scanner (10.88.0.4) to target (43.255.154.27):
10.88.0.4
10.206.6.220
10.206.35.36
10.206.32.1
173.255.239.101
23.203.154.22
168.143.191.150
63.243.218.17
116.51.18.183
148.72.204.155
10.253.0.56
10.253.0.60
10.253.193.2
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 37

. . . continued from previous page . . .


10.253.193.6
10.253.193.26
43.255.154.27
Network distance between scanner and target: 16

Solution:

Vulnerability Insight
For internal networks, the distances are usually small, often less than 4 hosts between scanner
and target. For public targets the distance is greater and might be 10 hosts or more.

Log Method
A combination of the protocols ICMP and TCP is used to determine the route. This method is
applicable for IPv4 only and it is also known as 'traceroute'.
Details: Traceroute
OID:1.3.6.1.4.1.25623.1.0.51662
Version used: 2022-10-17T11:13:19Z

Log (CVSS: 0.0)


NVT: Unknown OS and Service Banner Reporting

Summary
This VT consolidates and reports the information collected by the following VTs:
- Collect banner of unknown services (OID: 1.3.6.1.4.1.25623.1.0.11154)
- Service Detection (unknown) with nmap (OID: 1.3.6.1.4.1.25623.1.0.66286)
- Service Detection (wrapped) with nmap (OID: 1.3.6.1.4.1.25623.1.0.108525)
- OS Detection Consolidation and Reporting (OID: 1.3.6.1.4.1.25623.1.0.105937)
If you know any of the information reported here, please send the full output to the referenced
community forum.

Quality of Detection: 80
Vulnerability Detection Result
Unknown banners have been collected which might help to identify the OS running
,→on this host. If these banners containing information about the host OS please
,→ report the following information to https://forum.greenbone.net/c/vulnerabili
,→ty-tests/7:
Banner: 5.5.5-10.6.18-MariaDB-cll-lve
Identified from: MySQL/MariaDB server banner on port 3306/tcp
Banner: 421 Too many concurrent SMTP connections from this IP address; please tr
,→y again later.
Identified from: SMTP banner on port 25/tcp
Banner: 421 Too many concurrent SMTP connections from this IP address; please tr
,→y again later.
Identified from: SMTP banner on port 587/tcp
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 38

. . . continued from previous page . . .

Solution:

Log Method
Details: Unknown OS and Service Banner Reporting
OID:1.3.6.1.4.1.25623.1.0.108441
Version used: 2023-06-22T10:34:15Z

References
url: https://forum.greenbone.net/c/vulnerability-tests/7

[ return to 43.255.154.27 ]

2.1.12 Log 2077/tcp

Log (CVSS: 0.0)


NVT: Response Time / No 404 Error Code Check

Summary
This VT tests if the remote web server does not reply with a 404 error code and checks if it is
replying to the scanners requests in a reasonable amount of time.

Quality of Detection: 80
Vulnerability Detection Result
The remote web server is very slow - it took 79 seconds (Maximum response time c
,→onfigured in 'Response Time / No 404 Error Code Check' (OID: 1.3.6.1.4.1.25623
,→.1.0.10386) preferences: 60 seconds) to execute the plugin no404.nasl (it usua
,→lly only takes a few seconds).
In order to keep the scan total time to a reasonable amount, the remote web serv
,→er has not been tested.
If the remote server should be tested it has to be fixed to have it reply to the
,→ scanners requests in a reasonable amount of time. Alternatively the 'Maximum
,→response time (in seconds)' preference could be raised to a higher value if lo
,→nger scan times are accepted.

Solution:

Vulnerability Insight
This web server might show the following issues:
- it is [mis]congured in that it does not return '404 Not Found' error codes when a non-existent
le is requested, perhaps returning a site map, search page, authentication page or redirect
instead.
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 39

. . . continued from previous page . . .


The Scanner might enabled some counter measures for that, however they might be insucient.
If a great number of security issues are reported for this port, they might not all be accurate.
- it doesn't response in a reasonable amount of time to various HTTP requests sent by this VT.
In order to keep the scan total time to a reasonable amount, the remote web server might not be
tested. If the remote server should be tested it has to be xed to have it reply to the scanners
requests in a reasonable amount of time.
Alternatively the 'Maximum response time (in seconds)' preference could be raised to a higher
value if longer scan times are accepted.

Log Method
Details: Response Time / No 404 Error Code Check
OID:1.3.6.1.4.1.25623.1.0.10386
Version used: 2023-07-07T05:05:26Z

Log (CVSS: 0.0)


NVT: Response Time / No 404 Error Code Check

Summary
This VT tests if the remote web server does not reply with a 404 error code and checks if it is
replying to the scanners requests in a reasonable amount of time.

Quality of Detection: 80
Vulnerability Detection Result
The host returns a 30x (e.g. 301) error code when a non-existent file is request
,→ed. Some HTTP-related checks have been disabled.

Solution:

Vulnerability Insight
This web server might show the following issues:
- it is [mis]congured in that it does not return '404 Not Found' error codes when a non-existent
le is requested, perhaps returning a site map, search page, authentication page or redirect
instead.
The Scanner might enabled some counter measures for that, however they might be insucient.
If a great number of security issues are reported for this port, they might not all be accurate.
- it doesn't response in a reasonable amount of time to various HTTP requests sent by this VT.
In order to keep the scan total time to a reasonable amount, the remote web server might not be
tested. If the remote server should be tested it has to be xed to have it reply to the scanners
requests in a reasonable amount of time.
Alternatively the 'Maximum response time (in seconds)' preference could be raised to a higher
value if longer scan times are accepted.

Log Method
Details: Response Time / No 404 Error Code Check
OID:1.3.6.1.4.1.25623.1.0.10386
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 40

. . . continued from previous page . . .


Version used: 2023-07-07T05:05:26Z

Log (CVSS: 0.0)


NVT: Services

Summary
This plugin performs service detection.

Quality of Detection: 80
Vulnerability Detection Result
A web server is running on this port

Solution:

Vulnerability Insight
This plugin attempts to guess which service is running on the remote port(s). For instance,
it searches for a web server which could listen on another port than 80 or 443 and makes this
information available for other check routines.

Log Method
Details: Services
OID:1.3.6.1.4.1.25623.1.0.10330
Version used: 2023-06-14T05:05:19Z

Log (CVSS: 0.0)


NVT: Web Application Scanning Consolidation / Info Reporting

Summary
The script consolidates and reports various information for web application (formerly called
'CGI') scanning.
This information is based on the following scripts / settings:
- HTTP-Version Detection (OID: 1.3.6.1.4.1.25623.1.0.100034)
- No 404 check (OID: 1.3.6.1.4.1.25623.1.0.10386)
- Web mirroring / webmirror.nasl (OID: 1.3.6.1.4.1.25623.1.0.10662)
- Directory Scanner / DDI_Directory_Scanner.nasl (OID: 1.3.6.1.4.1.25623.1.0.11032)
- The congured 'cgi_path' within the 'Scanner Preferences' of the scan cong in use
- The congured 'Enable CGI scanning', 'Enable generic web application scanning' and 'Add
historic /scripts and /cgi-bin to directories for CGI scanning' within the 'Global variable settings'
of the scan cong in use
If you think any of this information is wrong please report it to the referenced community forum.

Quality of Detection: 80
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 41

. . . continued from previous page . . .


Vulnerability Detection Result
The Hostname/IP "www.unisoftindia.org" was used to access the remote host.
Generic web application scanning is disabled for this host via the "Enable gener
,→ic web application scanning" option within the "Global variable settings" of t
,→he scan config in use.
This service is marked as broken and no web application scanning is launched aga
,→inst it. Reason(s):
-----
- The remote web server is very slow - it took 79 seconds (Maximum response tim
,→e configured in 'Response Time / No 404 Error Code Check' (OID: 1.3.6.1.4.1.25
,→623.1.0.10386) preferences: 60 seconds) to execute the plugin no404.nasl (it u
,→sually only takes a few seconds).
In order to keep the scan total time to a reasonable amount, the remote web serv
,→er has not been tested.
If the remote server should be tested it has to be fixed to have it reply to the
,→ scanners requests in a reasonable amount of time. Alternatively the 'Maximum
,→response time (in seconds)' preference could be raised to a higher value if lo
,→nger scan times are accepted.
-----
Requests to this service are done via HTTP/1.1.
This service seems to be able to host PHP scripts.
This service seems to be able to host ASP scripts.
The User-Agent "Mozilla/5.0 [en] (X11, U; OpenVAS-VT 21.4.3)" was used to access
,→ the remote host.
Historic /scripts and /cgi-bin are not added to the directories used for web app
,→lication scanning. You can enable this again with the "Add historic /scripts a
,→nd /cgi-bin to directories for CGI scanning" option within the "Global variabl
,→e settings" of the scan config in use.
The following directories were used for web application scanning:
http://www.unisoftindia.org:2077/
While this is not, in and of itself, a bug, you should manually inspect these di
,→rectories to ensure that they are in compliance with company security standard
,→s

Solution:

Log Method
Details: Web Application Scanning Consolidation / Info Reporting
OID:1.3.6.1.4.1.25623.1.0.111038
Version used: 2024-07-03T06:48:05Z

References
url: https://forum.greenbone.net/c/vulnerability-tests/7

[ return to 43.255.154.27 ]

Generated by HostedScan
2 RESULTS PER HOST 42

2.1.13 Log 2083/tcp

Log (CVSS: 0.0)


NVT: elFinder Detection (HTTP)

Summary
HTTP based detection of elFinder.

Quality of Detection: 80
Vulnerability Detection Result
Detected elFinder
Version: unknown
Location: /
CPE: cpe:/a:std42:elfinder

Solution:

Log Method
Details: elFinder Detection (HTTP)
OID:1.3.6.1.4.1.25623.1.0.113323
Version used: 2023-03-01T10:20:05Z

References
url: https://studio-42.github.io/elFinder/

Log (CVSS: 0.0)


NVT: HTTP Security Headers Detection

Summary
All known security headers are being checked on the remote web server.
On completion a report will hand back whether a specic security header has been implemented
(including its value and if it is deprecated) or is missing on the target.

Quality of Detection: 80
Vulnerability Detection Result
Missing Headers | More Information
--------------------------------------------------------------------------------
,→------------------------------------------------------------------------------
,→------------------------------------------------------------------------------
,→----------
Content-Security-Policy | https://owasp.org/www-project-secure-headers
,→/#content-security-policy
Cross-Origin-Embedder-Policy | https://scotthelme.co.uk/coop-and-coep/, Not
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 43

. . . continued from previous page . . .


,→e: This is an upcoming header
Cross-Origin-Opener-Policy | https://scotthelme.co.uk/coop-and-coep/, Not
,→e: This is an upcoming header
Cross-Origin-Resource-Policy | https://scotthelme.co.uk/coop-and-coep/, Not
,→e: This is an upcoming header
Document-Policy | https://w3c.github.io/webappsec-feature-poli
,→cy/document-policy#document-policy-http-header
Expect-CT | https://owasp.org/www-project-secure-headers
,→/#expect-ct, Note: This is an upcoming header
Feature-Policy | https://owasp.org/www-project-secure-headers
,→/#feature-policy, Note: The Feature Policy header has been renamed to Permissi
,→ons Policy
Permissions-Policy | https://w3c.github.io/webappsec-feature-poli
,→cy/#permissions-policy-http-header-field
Public-Key-Pins | Please check the output of the VTs including
,→ 'SSL/TLS:' and 'HPKP' in their name for more information and configuration he
,→lp. Note: Most major browsers have dropped / deprecated support for this heade
,→r in 2020.
Referrer-Policy | https://owasp.org/www-project-secure-headers
,→/#referrer-policy
Sec-Fetch-Dest | https://developer.mozilla.org/en-US/docs/Web
,→/HTTP/Headers#fetch_metadata_request_headers, Note: This is a new header suppo
,→rted only in newer browsers like e.g. Firefox 90
Sec-Fetch-Mode | https://developer.mozilla.org/en-US/docs/Web
,→/HTTP/Headers#fetch_metadata_request_headers, Note: This is a new header suppo
,→rted only in newer browsers like e.g. Firefox 90
Sec-Fetch-Site | https://developer.mozilla.org/en-US/docs/Web
,→/HTTP/Headers#fetch_metadata_request_headers, Note: This is a new header suppo
,→rted only in newer browsers like e.g. Firefox 90
Sec-Fetch-User | https://developer.mozilla.org/en-US/docs/Web
,→/HTTP/Headers#fetch_metadata_request_headers, Note: This is a new header suppo
,→rted only in newer browsers like e.g. Firefox 90
Strict-Transport-Security | Please check the output of the VTs including
,→ 'SSL/TLS:' and 'HSTS' in their name for more information and configuration he
,→lp.
X-Content-Type-Options | https://owasp.org/www-project-secure-headers
,→/#x-content-type-options
X-Frame-Options | https://owasp.org/www-project-secure-headers
,→/#x-frame-options
X-Permitted-Cross-Domain-Policies | https://owasp.org/www-project-secure-headers
,→/#x-permitted-cross-domain-policies
X-XSS-Protection | https://owasp.org/www-project-secure-headers
,→/#x-xss-protection, Note: Most major browsers have dropped / deprecated suppor
,→t for this header in 2020.

Solution:
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 44

. . . continued from previous page . . .

Log Method
Details: HTTP Security Headers Detection
OID:1.3.6.1.4.1.25623.1.0.112081
Version used: 2021-07-14T06:19:43Z

References
url: https://owasp.org/www-project-secure-headers/
url: https://owasp.org/www-project-secure-headers/#div-headers
url: https://securityheaders.com/

Log (CVSS: 0.0)


NVT: robot.txt / robots.txt exists on the Web Server (HTTP)

Summary
Web Servers can use a le called /robot(s).txt to ask search engines to ignore certain les and
directories. By nature this le can not be used to protect private les from public read access.

Quality of Detection: 80
Vulnerability Detection Result
The file 'https://www.unisoftindia.org:2083/robots.txt' contains the following:
User-agent: *
Disallow: /

Solution:
Solution type: Mitigation
Review the content of the /robot(s).txt le and consider removing the les from the server or
protect them in other ways in case you actually intended non-public availability.

Vulnerability Insight
Any serious web search engine will honor the /robot(s).txt le and not scan the les and direc-
tories listed there.
Any entries listed in this le are not even hidden anymore.

Log Method
Details: robot.txt / robots.txt exists on the Web Server (HTTP)
OID:1.3.6.1.4.1.25623.1.0.10302
Version used: 2024-02-26T14:36:40Z

References
url: https://www.robotstxt.org/
url: https://www.robotstxt.org/norobots-rfc.txt

Generated by HostedScan
2 RESULTS PER HOST 45

Log (CVSS: 0.0)


NVT: Services

Summary
This plugin performs service detection.

Quality of Detection: 80
Vulnerability Detection Result
A TLScustom server answered on this port

Solution:

Vulnerability Insight
This plugin attempts to guess which service is running on the remote port(s). For instance,
it searches for a web server which could listen on another port than 80 or 443 and makes this
information available for other check routines.

Log Method
Details: Services
OID:1.3.6.1.4.1.25623.1.0.10330
Version used: 2023-06-14T05:05:19Z

Log (CVSS: 0.0)


NVT: Services

Summary
This plugin performs service detection.

Quality of Detection: 80
Vulnerability Detection Result
A web server is running on this port through SSL

Solution:

Vulnerability Insight
This plugin attempts to guess which service is running on the remote port(s). For instance,
it searches for a web server which could listen on another port than 80 or 443 and makes this
information available for other check routines.

Log Method
Details: Services
OID:1.3.6.1.4.1.25623.1.0.10330
Version used: 2023-06-14T05:05:19Z

Generated by HostedScan
2 RESULTS PER HOST 46

Log (CVSS: 0.0)


NVT: SSL/TLS: Collect and Report Certicate Details

Summary
This script collects and reports the details of all SSL/TLS certicates.
This data will be used by other tests to verify server certicates.

Quality of Detection: 98
Vulnerability Detection Result
The following certificate details of the remote service were collected.
Certificate details:
fingerprint (SHA-1) | B84E1827B136A8486244AEEE4F16AE2670E6DA49
fingerprint (SHA-256) | 28AB1C338D758F90F3B028FEE86033C303C5B11A3A0D19
,→598AA913C6D27DE14A
issued by | CN=Go Daddy Secure Certificate Authority - G2,
,→OU=http://certs.godaddy.com/repository/,O=GoDaddy.com\, Inc.,L=Scottsdale,ST=A
,→rizona,C=US
public key size (bits) | 2048
serial | 64BBBEECF3D5182D
signature algorithm | sha256WithRSAEncryption
subject | CN=unisoftindia.org
subject alternative names (SAN) | unisoftindia.org, www.unisoftindia.org
valid from | 2024-05-01 10:56:00 UTC
valid until | 2025-05-01 10:43:30 UTC

Solution:

Log Method
Details: SSL/TLS: Collect and Report Certificate Details
OID:1.3.6.1.4.1.25623.1.0.103692
Version used: 2024-06-14T05:05:48Z

Log (CVSS: 0.0)


NVT: SSL/TLS: HTTP Public Key Pinning (HPKP) Missing

Summary
The remote web server is not enforcing HTTP Public Key Pinning (HPKP).
Note: Most major browsers have dropped / deprecated support for this header in 2020.

Quality of Detection: 80
Vulnerability Detection Result
The remote web server is not enforcing HPKP.
HTTP-Banner:
HTTP/1.1 200 OK
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 47

. . . continued from previous page . . .


Connection: close
Content-Type: text/html; charset="utf-8"
Date: ***replaced***
Cache-Control: no-cache, no-store, must-revalidate, private
Pragma: no-cache
Set-Cookie: ***replaced***
Set-Cookie: ***replaced***
Set-Cookie: ***replaced***
Set-Cookie: ***replaced***
Set-Cookie: ***replaced***
Cache-Control: no-cache, no-store, must-revalidate, private
Content-Length: ***replaced***

Solution:
Solution type: Workaround
Enable HPKP or add / congure the required directives correctly following the guides linked in
the references.
Note: Some web servers are not sending headers on specic status codes by default. Please review
your web server or application conguration to always send these headers on every response
independently from the status code.
- Apache: Use 'Header always set' instead of 'Header set'.
- nginx: Append the 'always' keyword to each 'add_header' directive.
For dierent applications or web severs please refer to the related documentation for a similar
conguration possibility.

Log Method
Details: SSL/TLS: HTTP Public Key Pinning (HPKP) Missing
OID:1.3.6.1.4.1.25623.1.0.108247
Version used: 2024-02-08T05:05:59Z

References
url: https://owasp.org/www-project-secure-headers/
url: https://owasp.org/www-project-secure-headers/#public-key-pinning-extension-
,→for-http-hpkp
url: https://tools.ietf.org/html/rfc7469
url: https://securityheaders.io/
url: https://httpd.apache.org/docs/current/mod/mod_headers.html#header
url: https://nginx.org/en/docs/http/ngx_http_headers_module.html#add_header

Log (CVSS: 0.0)


NVT: SSL/TLS: HTTP Strict Transport Security (HSTS) Missing

Summary
The remote web server is not enforcing HTTP Strict Transport Security (HSTS).

. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 48

. . . continued from previous page . . .


Quality of Detection: 80
Vulnerability Detection Result
The remote web server is not enforcing HSTS.
HTTP-Banner:
HTTP/1.1 200 OK
Connection: close
Content-Type: text/html; charset="utf-8"
Date: ***replaced***
Cache-Control: no-cache, no-store, must-revalidate, private
Pragma: no-cache
Set-Cookie: ***replaced***
Set-Cookie: ***replaced***
Set-Cookie: ***replaced***
Set-Cookie: ***replaced***
Set-Cookie: ***replaced***
Cache-Control: no-cache, no-store, must-revalidate, private
Content-Length: ***replaced***

Solution:
Solution type: Workaround
Enable HSTS or add / congure the required directives correctly following the guides linked in
the references.
Note: Some web servers are not sending headers on specic status codes by default. Please review
your web server or application conguration to always send these headers on every response
independently from the status code.
- Apache: Use 'Header always set' instead of 'Header set'.
- nginx: Append the 'always' keyword to each 'add_header' directive.
For dierent applications or web severs please refer to the related documentation for a similar
conguration possibility.

Log Method
Details: SSL/TLS: HTTP Strict Transport Security (HSTS) Missing
OID:1.3.6.1.4.1.25623.1.0.105879
Version used: 2024-02-08T05:05:59Z

References
url: https://owasp.org/www-project-secure-headers/
url: https://owasp.org/www-project-cheat-sheets/cheatsheets/HTTP_Strict_Transpor
,→t_Security_Cheat_Sheet.html
url: https://owasp.org/www-project-secure-headers/#http-strict-transport-securit
,→y-hsts
url: https://tools.ietf.org/html/rfc6797
url: https://securityheaders.io/
url: https://httpd.apache.org/docs/current/mod/mod_headers.html#header
url: https://nginx.org/en/docs/http/ngx_http_headers_module.html#add_header

Generated by HostedScan
2 RESULTS PER HOST 49

Log (CVSS: 0.0)


NVT: SSL/TLS: Report Medium Cipher Suites

Summary
This routine reports all Medium SSL/TLS cipher suites accepted by a service.

Quality of Detection: 98
Vulnerability Detection Result
'Medium' cipher suites accepted by this service via the TLSv1.2 protocol:
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
'Medium' cipher suites accepted by this service via the TLSv1.3 protocol:
TLS_AES_128_CCM_SHA256
TLS_AES_128_GCM_SHA256

Solution:

Vulnerability Insight
Any cipher suite considered to be secure for only the next 10 years is considered as medium.

Log Method
Details: SSL/TLS: Report Medium Cipher Suites
OID:1.3.6.1.4.1.25623.1.0.902816
Version used: 2024-06-14T05:05:48Z

Log (CVSS: 0.0)


NVT: SSL/TLS: Report Non Weak Cipher Suites

Summary
This routine reports all Non Weak SSL/TLS cipher suites accepted by a service.

Quality of Detection: 98
Vulnerability Detection Result
'Non Weak' cipher suites accepted by this service via the TLSv1.2 protocol:
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
'Non Weak' cipher suites accepted by this service via the TLSv1.3 protocol:
TLS_AES_128_CCM_SHA256
TLS_AES_128_GCM_SHA256
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 50

. . . continued from previous page . . .


TLS_AES_256_GCM_SHA384
TLS_CHACHA20_POLY1305_SHA256

Solution:

Log Method
Details: SSL/TLS: Report Non Weak Cipher Suites
OID:1.3.6.1.4.1.25623.1.0.103441
Version used: 2024-06-14T05:05:48Z

Log (CVSS: 0.0)


NVT: SSL/TLS: Report Perfect Forward Secrecy (PFS) Cipher Suites

Summary
This routine reports all SSL/TLS cipher suites accepted by a service which are supporting Perfect
Forward Secrecy (PFS).

Quality of Detection: 98
Vulnerability Detection Result
Cipher suites supporting Perfect Forward Secrecy (PFS) are accepted by this serv
,→ice via the TLSv1.2 protocol:
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
Cipher suites supporting Perfect Forward Secrecy (PFS) are accepted by this serv
,→ice via the TLSv1.3 protocol:
TLS_AES_128_CCM_SHA256
TLS_AES_128_GCM_SHA256
TLS_AES_256_GCM_SHA384
TLS_CHACHA20_POLY1305_SHA256

Solution:

Log Method
Details: SSL/TLS: Report Perfect Forward Secrecy (PFS) Cipher Suites
OID:1.3.6.1.4.1.25623.1.0.105018
Version used: 2024-06-14T05:05:48Z

. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 51

. . . continued from previous page . . .

Log (CVSS: 0.0)


NVT: SSL/TLS: Report Supported Cipher Suites

Summary
This routine reports all SSL/TLS cipher suites accepted by a service.

Quality of Detection: 98
Vulnerability Detection Result
'Strong' cipher suites accepted by this service via the TLSv1.2 protocol:
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
'Medium' cipher suites accepted by this service via the TLSv1.2 protocol:
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
No 'Weak' cipher suites accepted by this service via the TLSv1.2 protocol.
No 'Null' cipher suites accepted by this service via the TLSv1.2 protocol.
No 'Anonymous' cipher suites accepted by this service via the TLSv1.2 protocol.
'Strong' cipher suites accepted by this service via the TLSv1.3 protocol:
TLS_AES_256_GCM_SHA384
TLS_CHACHA20_POLY1305_SHA256
'Medium' cipher suites accepted by this service via the TLSv1.3 protocol:
TLS_AES_128_CCM_SHA256
TLS_AES_128_GCM_SHA256
No 'Weak' cipher suites accepted by this service via the TLSv1.3 protocol.
No 'Null' cipher suites accepted by this service via the TLSv1.3 protocol.
No 'Anonymous' cipher suites accepted by this service via the TLSv1.3 protocol.

Solution:

Vulnerability Insight
Notes:
- As the VT 'SSL/TLS: Check Supported Cipher Suites' (OID: 1.3.6.1.4.1.25623.1.0.900234)
might run into a timeout the actual reporting of all accepted cipher suites takes place in this VT
instead.
- SSLv2 ciphers are not getting reported as the protocol itself is deprecated, needs to be considered
as weak and is reported separately as deprecated.

Log Method
Details: SSL/TLS: Report Supported Cipher Suites
OID:1.3.6.1.4.1.25623.1.0.802067
Version used: 2024-06-14T05:05:48Z

Generated by HostedScan
2 RESULTS PER HOST 52

Log (CVSS: 0.0)


NVT: SSL/TLS: Version Detection

Summary
Enumeration and reporting of SSL/TLS protocol versions supported by a remote service.

Quality of Detection: 80
Vulnerability Detection Result
The remote SSL/TLS service supports the following SSL/TLS protocol version(s):
TLSv1.2
TLSv1.3

Solution:

Log Method
Sends multiple connection requests to the remote service and attempts to determine the SSL/TLS
protocol versions supported by the service from the replies.
Note: The supported SSL/TLS protocol versions included in the report of this VT are reported
independently from the allowed / supported SSL/TLS ciphers.
Details: SSL/TLS: Version Detection
OID:1.3.6.1.4.1.25623.1.0.105782
Version used: 2024-06-14T05:05:48Z

Log (CVSS: 0.0)


NVT: Web Application Scanning Consolidation / Info Reporting

Summary
The script consolidates and reports various information for web application (formerly called
'CGI') scanning.
This information is based on the following scripts / settings:
- HTTP-Version Detection (OID: 1.3.6.1.4.1.25623.1.0.100034)
- No 404 check (OID: 1.3.6.1.4.1.25623.1.0.10386)
- Web mirroring / webmirror.nasl (OID: 1.3.6.1.4.1.25623.1.0.10662)
- Directory Scanner / DDI_Directory_Scanner.nasl (OID: 1.3.6.1.4.1.25623.1.0.11032)
- The congured 'cgi_path' within the 'Scanner Preferences' of the scan cong in use
- The congured 'Enable CGI scanning', 'Enable generic web application scanning' and 'Add
historic /scripts and /cgi-bin to directories for CGI scanning' within the 'Global variable settings'
of the scan cong in use
If you think any of this information is wrong please report it to the referenced community forum.

Quality of Detection: 80
Vulnerability Detection Result
The Hostname/IP "www.unisoftindia.org" was used to access the remote host.
Generic web application scanning is disabled for this host via the "Enable gener
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 53

. . . continued from previous page . . .


,→ic web application scanning" option within the "Global variable settings" of t
,→he scan config in use.
Requests to this service are done via HTTP/1.1.
This service seems to be able to host PHP scripts.
This service seems to be able to host ASP scripts.
The User-Agent "Mozilla/5.0 [en] (X11, U; OpenVAS-VT 21.4.3)" was used to access
,→ the remote host.
Historic /scripts and /cgi-bin are not added to the directories used for web app
,→lication scanning. You can enable this again with the "Add historic /scripts a
,→nd /cgi-bin to directories for CGI scanning" option within the "Global variabl
,→e settings" of the scan config in use.
The following directories were used for web application scanning:
https://www.unisoftindia.org:2083/
While this is not, in and of itself, a bug, you should manually inspect these di
,→rectories to ensure that they are in compliance with company security standard
,→s

Solution:

Log Method
Details: Web Application Scanning Consolidation / Info Reporting
OID:1.3.6.1.4.1.25623.1.0.111038
Version used: 2024-07-03T06:48:05Z

References
url: https://forum.greenbone.net/c/vulnerability-tests/7

[ return to 43.255.154.27 ]

2.1.14 Log 2087/tcp

Log (CVSS: 0.0)


NVT: elFinder Detection (HTTP)

Summary
HTTP based detection of elFinder.

Quality of Detection: 80
Vulnerability Detection Result
Detected elFinder
Version: unknown
Location: /
CPE: cpe:/a:std42:elfinder
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 54

. . . continued from previous page . . .

Solution:

Log Method
Details: elFinder Detection (HTTP)
OID:1.3.6.1.4.1.25623.1.0.113323
Version used: 2023-03-01T10:20:05Z

References
url: https://studio-42.github.io/elFinder/

Log (CVSS: 0.0)


NVT: HTTP Security Headers Detection

Summary
All known security headers are being checked on the remote web server.
On completion a report will hand back whether a specic security header has been implemented
(including its value and if it is deprecated) or is missing on the target.

Quality of Detection: 80
Vulnerability Detection Result
Missing Headers | More Information
--------------------------------------------------------------------------------
,→------------------------------------------------------------------------------
,→------------------------------------------------------------------------------
,→----------
Content-Security-Policy | https://owasp.org/www-project-secure-headers
,→/#content-security-policy
Cross-Origin-Embedder-Policy | https://scotthelme.co.uk/coop-and-coep/, Not
,→e: This is an upcoming header
Cross-Origin-Opener-Policy | https://scotthelme.co.uk/coop-and-coep/, Not
,→e: This is an upcoming header
Cross-Origin-Resource-Policy | https://scotthelme.co.uk/coop-and-coep/, Not
,→e: This is an upcoming header
Document-Policy | https://w3c.github.io/webappsec-feature-poli
,→cy/document-policy#document-policy-http-header
Expect-CT | https://owasp.org/www-project-secure-headers
,→/#expect-ct, Note: This is an upcoming header
Feature-Policy | https://owasp.org/www-project-secure-headers
,→/#feature-policy, Note: The Feature Policy header has been renamed to Permissi
,→ons Policy
Permissions-Policy | https://w3c.github.io/webappsec-feature-poli
,→cy/#permissions-policy-http-header-field
Public-Key-Pins | Please check the output of the VTs including
,→ 'SSL/TLS:' and 'HPKP' in their name for more information and configuration he
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 55

. . . continued from previous page . . .


,→lp. Note: Most major browsers have dropped / deprecated support for this heade
,→r in 2020.
Referrer-Policy | https://owasp.org/www-project-secure-headers
,→/#referrer-policy
Sec-Fetch-Dest | https://developer.mozilla.org/en-US/docs/Web
,→/HTTP/Headers#fetch_metadata_request_headers, Note: This is a new header suppo
,→rted only in newer browsers like e.g. Firefox 90
Sec-Fetch-Mode | https://developer.mozilla.org/en-US/docs/Web
,→/HTTP/Headers#fetch_metadata_request_headers, Note: This is a new header suppo
,→rted only in newer browsers like e.g. Firefox 90
Sec-Fetch-Site | https://developer.mozilla.org/en-US/docs/Web
,→/HTTP/Headers#fetch_metadata_request_headers, Note: This is a new header suppo
,→rted only in newer browsers like e.g. Firefox 90
Sec-Fetch-User | https://developer.mozilla.org/en-US/docs/Web
,→/HTTP/Headers#fetch_metadata_request_headers, Note: This is a new header suppo
,→rted only in newer browsers like e.g. Firefox 90
Strict-Transport-Security | Please check the output of the VTs including
,→ 'SSL/TLS:' and 'HSTS' in their name for more information and configuration he
,→lp.
X-Content-Type-Options | https://owasp.org/www-project-secure-headers
,→/#x-content-type-options
X-Frame-Options | https://owasp.org/www-project-secure-headers
,→/#x-frame-options
X-Permitted-Cross-Domain-Policies | https://owasp.org/www-project-secure-headers
,→/#x-permitted-cross-domain-policies
X-XSS-Protection | https://owasp.org/www-project-secure-headers
,→/#x-xss-protection, Note: Most major browsers have dropped / deprecated suppor
,→t for this header in 2020.

Solution:

Log Method
Details: HTTP Security Headers Detection
OID:1.3.6.1.4.1.25623.1.0.112081
Version used: 2021-07-14T06:19:43Z

References
url: https://owasp.org/www-project-secure-headers/
url: https://owasp.org/www-project-secure-headers/#div-headers
url: https://securityheaders.com/

Log (CVSS: 0.0)


NVT: robot.txt / robots.txt exists on the Web Server (HTTP)

Summary
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 56

. . . continued from previous page . . .


Web Servers can use a le called /robot(s).txt to ask search engines to ignore certain les and
directories. By nature this le can not be used to protect private les from public read access.

Quality of Detection: 80
Vulnerability Detection Result
The file 'https://www.unisoftindia.org:2087/robots.txt' contains the following:
User-agent: *
Disallow: /

Solution:
Solution type: Mitigation
Review the content of the /robot(s).txt le and consider removing the les from the server or
protect them in other ways in case you actually intended non-public availability.

Vulnerability Insight
Any serious web search engine will honor the /robot(s).txt le and not scan the les and direc-
tories listed there.
Any entries listed in this le are not even hidden anymore.

Log Method
Details: robot.txt / robots.txt exists on the Web Server (HTTP)
OID:1.3.6.1.4.1.25623.1.0.10302
Version used: 2024-02-26T14:36:40Z

References
url: https://www.robotstxt.org/
url: https://www.robotstxt.org/norobots-rfc.txt

Log (CVSS: 0.0)


NVT: Services

Summary
This plugin performs service detection.

Quality of Detection: 80
Vulnerability Detection Result
A TLScustom server answered on this port

Solution:

Vulnerability Insight
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 57

. . . continued from previous page . . .


This plugin attempts to guess which service is running on the remote port(s). For instance,
it searches for a web server which could listen on another port than 80 or 443 and makes this
information available for other check routines.

Log Method
Details: Services
OID:1.3.6.1.4.1.25623.1.0.10330
Version used: 2023-06-14T05:05:19Z

Log (CVSS: 0.0)


NVT: Services

Summary
This plugin performs service detection.

Quality of Detection: 80
Vulnerability Detection Result
A web server is running on this port through SSL

Solution:

Vulnerability Insight
This plugin attempts to guess which service is running on the remote port(s). For instance,
it searches for a web server which could listen on another port than 80 or 443 and makes this
information available for other check routines.

Log Method
Details: Services
OID:1.3.6.1.4.1.25623.1.0.10330
Version used: 2023-06-14T05:05:19Z

Log (CVSS: 0.0)


NVT: SSL/TLS: Collect and Report Certicate Details

Summary
This script collects and reports the details of all SSL/TLS certicates.
This data will be used by other tests to verify server certicates.

Quality of Detection: 98
Vulnerability Detection Result
The following certificate details of the remote service were collected.
Certificate details:
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 58

. . . continued from previous page . . .


fingerprint (SHA-1) | B84E1827B136A8486244AEEE4F16AE2670E6DA49
fingerprint (SHA-256) | 28AB1C338D758F90F3B028FEE86033C303C5B11A3A0D19
,→598AA913C6D27DE14A
issued by | CN=Go Daddy Secure Certificate Authority - G2,
,→OU=http://certs.godaddy.com/repository/,O=GoDaddy.com\, Inc.,L=Scottsdale,ST=A
,→rizona,C=US
public key size (bits) | 2048
serial | 64BBBEECF3D5182D
signature algorithm | sha256WithRSAEncryption
subject | CN=unisoftindia.org
subject alternative names (SAN) | unisoftindia.org, www.unisoftindia.org
valid from | 2024-05-01 10:56:00 UTC
valid until | 2025-05-01 10:43:30 UTC

Solution:

Log Method
Details: SSL/TLS: Collect and Report Certificate Details
OID:1.3.6.1.4.1.25623.1.0.103692
Version used: 2024-06-14T05:05:48Z

Log (CVSS: 0.0)


NVT: SSL/TLS: HTTP Public Key Pinning (HPKP) Missing

Summary
The remote web server is not enforcing HTTP Public Key Pinning (HPKP).
Note: Most major browsers have dropped / deprecated support for this header in 2020.

Quality of Detection: 80
Vulnerability Detection Result
The remote web server is not enforcing HPKP.
HTTP-Banner:
HTTP/1.1 200 OK
Connection: close
Content-Type: text/html; charset="utf-8"
Date: ***replaced***
Cache-Control: no-cache, no-store, must-revalidate, private
Pragma: no-cache
Set-Cookie: ***replaced***
Set-Cookie: ***replaced***
Set-Cookie: ***replaced***
Set-Cookie: ***replaced***
Set-Cookie: ***replaced***
Cache-Control: no-cache, no-store, must-revalidate, private
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 59

. . . continued from previous page . . .


Content-Length: ***replaced***

Solution:
Solution type: Workaround
Enable HPKP or add / congure the required directives correctly following the guides linked in
the references.
Note: Some web servers are not sending headers on specic status codes by default. Please review
your web server or application conguration to always send these headers on every response
independently from the status code.
- Apache: Use 'Header always set' instead of 'Header set'.
- nginx: Append the 'always' keyword to each 'add_header' directive.
For dierent applications or web severs please refer to the related documentation for a similar
conguration possibility.

Log Method
Details: SSL/TLS: HTTP Public Key Pinning (HPKP) Missing
OID:1.3.6.1.4.1.25623.1.0.108247
Version used: 2024-02-08T05:05:59Z

References
url: https://owasp.org/www-project-secure-headers/
url: https://owasp.org/www-project-secure-headers/#public-key-pinning-extension-
,→for-http-hpkp
url: https://tools.ietf.org/html/rfc7469
url: https://securityheaders.io/
url: https://httpd.apache.org/docs/current/mod/mod_headers.html#header
url: https://nginx.org/en/docs/http/ngx_http_headers_module.html#add_header

Log (CVSS: 0.0)


NVT: SSL/TLS: HTTP Strict Transport Security (HSTS) Missing

Summary
The remote web server is not enforcing HTTP Strict Transport Security (HSTS).

Quality of Detection: 80
Vulnerability Detection Result
The remote web server is not enforcing HSTS.
HTTP-Banner:
HTTP/1.1 200 OK
Connection: close
Content-Type: text/html; charset="utf-8"
Date: ***replaced***
Cache-Control: no-cache, no-store, must-revalidate, private
Pragma: no-cache
Set-Cookie: ***replaced***
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 60

. . . continued from previous page . . .


Set-Cookie: ***replaced***
Set-Cookie: ***replaced***
Set-Cookie: ***replaced***
Set-Cookie: ***replaced***
Cache-Control: no-cache, no-store, must-revalidate, private
Content-Length: ***replaced***

Solution:
Solution type: Workaround
Enable HSTS or add / congure the required directives correctly following the guides linked in
the references.
Note: Some web servers are not sending headers on specic status codes by default. Please review
your web server or application conguration to always send these headers on every response
independently from the status code.
- Apache: Use 'Header always set' instead of 'Header set'.
- nginx: Append the 'always' keyword to each 'add_header' directive.
For dierent applications or web severs please refer to the related documentation for a similar
conguration possibility.

Log Method
Details: SSL/TLS: HTTP Strict Transport Security (HSTS) Missing
OID:1.3.6.1.4.1.25623.1.0.105879
Version used: 2024-02-08T05:05:59Z

References
url: https://owasp.org/www-project-secure-headers/
url: https://owasp.org/www-project-cheat-sheets/cheatsheets/HTTP_Strict_Transpor
,→t_Security_Cheat_Sheet.html
url: https://owasp.org/www-project-secure-headers/#http-strict-transport-securit
,→y-hsts
url: https://tools.ietf.org/html/rfc6797
url: https://securityheaders.io/
url: https://httpd.apache.org/docs/current/mod/mod_headers.html#header
url: https://nginx.org/en/docs/http/ngx_http_headers_module.html#add_header

Log (CVSS: 0.0)


NVT: SSL/TLS: Report Medium Cipher Suites

Summary
This routine reports all Medium SSL/TLS cipher suites accepted by a service.

Quality of Detection: 98
Vulnerability Detection Result
'Medium' cipher suites accepted by this service via the TLSv1.2 protocol:
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 61

. . . continued from previous page . . .


TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
'Medium' cipher suites accepted by this service via the TLSv1.3 protocol:
TLS_AES_128_CCM_SHA256
TLS_AES_128_GCM_SHA256

Solution:

Vulnerability Insight
Any cipher suite considered to be secure for only the next 10 years is considered as medium.

Log Method
Details: SSL/TLS: Report Medium Cipher Suites
OID:1.3.6.1.4.1.25623.1.0.902816
Version used: 2024-06-14T05:05:48Z

Log (CVSS: 0.0)


NVT: SSL/TLS: Report Non Weak Cipher Suites

Summary
This routine reports all Non Weak SSL/TLS cipher suites accepted by a service.

Quality of Detection: 98
Vulnerability Detection Result
'Non Weak' cipher suites accepted by this service via the TLSv1.2 protocol:
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
'Non Weak' cipher suites accepted by this service via the TLSv1.3 protocol:
TLS_AES_128_CCM_SHA256
TLS_AES_128_GCM_SHA256
TLS_AES_256_GCM_SHA384
TLS_CHACHA20_POLY1305_SHA256

Solution:

Log Method
Details: SSL/TLS: Report Non Weak Cipher Suites
OID:1.3.6.1.4.1.25623.1.0.103441
Version used: 2024-06-14T05:05:48Z

. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 62

. . . continued from previous page . . .

Log (CVSS: 0.0)


NVT: SSL/TLS: Report Perfect Forward Secrecy (PFS) Cipher Suites

Summary
This routine reports all SSL/TLS cipher suites accepted by a service which are supporting Perfect
Forward Secrecy (PFS).

Quality of Detection: 98
Vulnerability Detection Result
Cipher suites supporting Perfect Forward Secrecy (PFS) are accepted by this serv
,→ice via the TLSv1.2 protocol:
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
Cipher suites supporting Perfect Forward Secrecy (PFS) are accepted by this serv
,→ice via the TLSv1.3 protocol:
TLS_AES_128_CCM_SHA256
TLS_AES_128_GCM_SHA256
TLS_AES_256_GCM_SHA384
TLS_CHACHA20_POLY1305_SHA256

Solution:

Log Method
Details: SSL/TLS: Report Perfect Forward Secrecy (PFS) Cipher Suites
OID:1.3.6.1.4.1.25623.1.0.105018
Version used: 2024-06-14T05:05:48Z

Log (CVSS: 0.0)


NVT: SSL/TLS: Report Supported Cipher Suites

Summary
This routine reports all SSL/TLS cipher suites accepted by a service.

Quality of Detection: 98
Vulnerability Detection Result
'Strong' cipher suites accepted by this service via the TLSv1.2 protocol:
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
'Medium' cipher suites accepted by this service via the TLSv1.2 protocol:
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
No 'Weak' cipher suites accepted by this service via the TLSv1.2 protocol.
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 63

. . . continued from previous page . . .


No 'Null' cipher suites accepted by this service via the TLSv1.2 protocol.
No 'Anonymous' cipher suites accepted by this service via the TLSv1.2 protocol.
'Strong' cipher suites accepted by this service via the TLSv1.3 protocol:
TLS_AES_256_GCM_SHA384
TLS_CHACHA20_POLY1305_SHA256
'Medium' cipher suites accepted by this service via the TLSv1.3 protocol:
TLS_AES_128_CCM_SHA256
TLS_AES_128_GCM_SHA256
No 'Weak' cipher suites accepted by this service via the TLSv1.3 protocol.
No 'Null' cipher suites accepted by this service via the TLSv1.3 protocol.
No 'Anonymous' cipher suites accepted by this service via the TLSv1.3 protocol.

Solution:

Vulnerability Insight
Notes:
- As the VT 'SSL/TLS: Check Supported Cipher Suites' (OID: 1.3.6.1.4.1.25623.1.0.900234)
might run into a timeout the actual reporting of all accepted cipher suites takes place in this VT
instead.
- SSLv2 ciphers are not getting reported as the protocol itself is deprecated, needs to be considered
as weak and is reported separately as deprecated.

Log Method
Details: SSL/TLS: Report Supported Cipher Suites
OID:1.3.6.1.4.1.25623.1.0.802067
Version used: 2024-06-14T05:05:48Z

Log (CVSS: 0.0)


NVT: SSL/TLS: Version Detection

Summary
Enumeration and reporting of SSL/TLS protocol versions supported by a remote service.

Quality of Detection: 80
Vulnerability Detection Result
The remote SSL/TLS service supports the following SSL/TLS protocol version(s):
TLSv1.2
TLSv1.3

Solution:

Log Method
Sends multiple connection requests to the remote service and attempts to determine the SSL/TLS
protocol versions supported by the service from the replies.
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 64

. . . continued from previous page . . .


Note: The supported SSL/TLS protocol versions included in the report of this VT are reported
independently from the allowed / supported SSL/TLS ciphers.
Details: SSL/TLS: Version Detection
OID:1.3.6.1.4.1.25623.1.0.105782
Version used: 2024-06-14T05:05:48Z

Log (CVSS: 0.0)


NVT: Web Application Scanning Consolidation / Info Reporting

Summary
The script consolidates and reports various information for web application (formerly called
'CGI') scanning.
This information is based on the following scripts / settings:
- HTTP-Version Detection (OID: 1.3.6.1.4.1.25623.1.0.100034)
- No 404 check (OID: 1.3.6.1.4.1.25623.1.0.10386)
- Web mirroring / webmirror.nasl (OID: 1.3.6.1.4.1.25623.1.0.10662)
- Directory Scanner / DDI_Directory_Scanner.nasl (OID: 1.3.6.1.4.1.25623.1.0.11032)
- The congured 'cgi_path' within the 'Scanner Preferences' of the scan cong in use
- The congured 'Enable CGI scanning', 'Enable generic web application scanning' and 'Add
historic /scripts and /cgi-bin to directories for CGI scanning' within the 'Global variable settings'
of the scan cong in use
If you think any of this information is wrong please report it to the referenced community forum.

Quality of Detection: 80
Vulnerability Detection Result
The Hostname/IP "www.unisoftindia.org" was used to access the remote host.
Generic web application scanning is disabled for this host via the "Enable gener
,→ic web application scanning" option within the "Global variable settings" of t
,→he scan config in use.
Requests to this service are done via HTTP/1.1.
This service seems to be able to host PHP scripts.
This service seems to be able to host ASP scripts.
The User-Agent "Mozilla/5.0 [en] (X11, U; OpenVAS-VT 21.4.3)" was used to access
,→ the remote host.
Historic /scripts and /cgi-bin are not added to the directories used for web app
,→lication scanning. You can enable this again with the "Add historic /scripts a
,→nd /cgi-bin to directories for CGI scanning" option within the "Global variabl
,→e settings" of the scan config in use.
A possible recursion was detected during web application scanning:
The service is using a relative URL in one or more HTML references where e.g. /f
,→ile1.html contains <a href="subdir/file2.html"> and a subsequent request for s
,→ubdir/file2.html is linking to subdir/file2.html. This would resolves to subdi
,→r/subdir/file2.html causing a recursion. To work around this counter-measures
,→have been enabled but the service should be fixed as well to not use such prob
,→lematic links. Below an excerpt of URLs is shown to help identify those issues
,→.
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 65

. . . continued from previous page . . .


Syntax : URL (HTML link)
https://www.unisoftindia.org:2087/cPanel_magic_revision_1705007155/unprotected/c
,→panel (data:image/x-icon;base64,AAABAAEAICAAAAEAIADSAgAAFgAAAIlQTkcNChoKAAAADU
,→lIRFIAAAAgAAAAIAgGAAAAc3p69AAAAplJREFUWIXt1j2IHGUYB/DfOzdnjIKFkECIVWIKvUFsIkRE
,→xa9KJCLaWAgWJx4DilZWgpDDiI0wiViIoGATP1CCEDYHSeCwUBBkgiiKURQJFiLo4d0eOxYzC8nsO9
,→m9XcXC+8MW+3z+9/l6l2383xH+iSBpElyTdoda26xsDqp/h0CVZ3vwKm7tMBngAs7h7eRYebG6hMtM
,→BHbMBX89vfARHprQ5U8cwdFQlIOZCVR5di1+w/wWXT/EY6EoN5NZCODuKZLDwzgSMCuBe2fwfX6QZw
,→tpWzqfBBtLC3txF/ZhxKbBGx0EfsTJS77vwmGjlZrD4mUzUOXZjVjGI65cnTXchB8iupdDUb7QinsQ
,→Z7GzZftdQj2JVZ49iC/w6JjksIo7OnS9tiA5Vn6GtyK2+1MY5NkhfGDygVrBAxH5WkPuMjR7/3UsUF
,→Ll2Q68s4XkA3ws3v9zoSjX28Kr5wL1xrTxa6ou+f6OZGvqPg9v1wZeaUjcELE/DVfNhWFSvy/enOIZ
,→9eq1sTokEMNLWI79oirP8g6fXpVnh7GEvY1sV/OJ4f0UhyKKk6EoX4x5pEkgXv6L6OM99YqNw/c4kX
,→SwG5nkIfpLCynuiahW1GWeJHkfT4aiXO9atz1XcD6I6yLyHu6bIPk6Hg9FeYZ63y9EjBarPDvQ8VJ1
,→nd9V3D4m+RncForyxFCQ4hSeahlej88Hefauurdwaufr5z/F/ZHAX6nL+mZE18e36IWiHLkFocqzW9
,→QXcNz1+wUHxJ/f10JRPjvGP4pk/vj5L3F8AtufdD+/p6dJDknzX+05fDLGtife/766t9MRgFCUffWT
,→udwE3AqBlVCUf0xLYGTQqzzbhydwJ3Y34g318J1tmX+DPBTlz9MS2MY2/nP8DTGaqeTDf30rAAAAAE
,→lFTkSuQmCC)
The following directories were used for web application scanning:
https://www.unisoftindia.org:2087/
https://www.unisoftindia.org:2087/cPanel_magic_revision_1648610195/unprotected/c
,→panel/fonts/open_sans
https://www.unisoftindia.org:2087/cPanel_magic_revision_1705007155/unprotected/c
,→panel
While this is not, in and of itself, a bug, you should manually inspect these di
,→rectories to ensure that they are in compliance with company security standard
,→s
The following directories were excluded from web application scanning because th
,→e "Regex pattern to exclude directories from CGI scanning" setting of the VT "
,→Global variable settings" (OID: 1.3.6.1.4.1.25623.1.0.12288) for this scan was
,→: "/(index\.php|image|img|css|js$|js/|javascript|style|theme|icon|jquery|graph
,→ic|grafik|picture|bilder|thumbnail|media/|skins?/)"
https://www.unisoftindia.org:2087/cPanel_magic_revision_1705006209/unprotected/c
,→panel/images
The following CGIs were discovered:
Syntax : cginame (arguments [default value])
https://www.unisoftindia.org:2087/ (locale [en] )
https://www.unisoftindia.org:2087/login/ (user [] pass [] )

Solution:

Log Method
Details: Web Application Scanning Consolidation / Info Reporting
OID:1.3.6.1.4.1.25623.1.0.111038
Version used: 2024-07-03T06:48:05Z

References
url: https://forum.greenbone.net/c/vulnerability-tests/7

Generated by HostedScan
2 RESULTS PER HOST 66

[ return to 43.255.154.27 ]

2.1.15 Log 993/tcp

Log (CVSS: 0.0)


NVT: IMAP Server type and version

Summary
This detects the IMAP Server's type and version by connecting to the server and processing the
received banner.

Quality of Detection: 80
Vulnerability Detection Result
Remote IMAP server banner:
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE NAMESPACE LITE
,→RAL+ AUTH=PLAIN AUTH=LOGIN] Dovecot ready.
* ID ("name" "Dovecot")
This is probably:
- Dovecot
The remote IMAP server is announcing the following available CAPABILITIES via an
,→ encrypted connection:
AUTH=LOGIN, AUTH=PLAIN, ENABLE, ID, IDLE, LITERAL+, LOGIN-REFERRALS, NAMESPACE,
,→SASL-IR

Solution:

Log Method
Details: IMAP Server type and version
OID:1.3.6.1.4.1.25623.1.0.11414
Version used: 2023-08-01T13:29:10Z

Log (CVSS: 0.0)


NVT: Services

Summary
This plugin performs service detection.

Quality of Detection: 80
Vulnerability Detection Result
A TLScustom server answered on this port

Solution:
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 67

. . . continued from previous page . . .

Vulnerability Insight
This plugin attempts to guess which service is running on the remote port(s). For instance,
it searches for a web server which could listen on another port than 80 or 443 and makes this
information available for other check routines.

Log Method
Details: Services
OID:1.3.6.1.4.1.25623.1.0.10330
Version used: 2023-06-14T05:05:19Z

Log (CVSS: 0.0)


NVT: Services

Summary
This plugin performs service detection.

Quality of Detection: 80
Vulnerability Detection Result
An IMAP server is running on this port through SSL

Solution:

Vulnerability Insight
This plugin attempts to guess which service is running on the remote port(s). For instance,
it searches for a web server which could listen on another port than 80 or 443 and makes this
information available for other check routines.

Log Method
Details: Services
OID:1.3.6.1.4.1.25623.1.0.10330
Version used: 2023-06-14T05:05:19Z

Log (CVSS: 0.0)


NVT: SSL/TLS: Collect and Report Certicate Details

Summary
This script collects and reports the details of all SSL/TLS certicates.
This data will be used by other tests to verify server certicates.

Quality of Detection: 98
Vulnerability Detection Result
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 68

. . . continued from previous page . . .


The following certificate details of the remote service were collected.
Certificate details:
fingerprint (SHA-1) | B84E1827B136A8486244AEEE4F16AE2670E6DA49
fingerprint (SHA-256) | 28AB1C338D758F90F3B028FEE86033C303C5B11A3A0D19
,→598AA913C6D27DE14A
issued by | CN=Go Daddy Secure Certificate Authority - G2,
,→OU=http://certs.godaddy.com/repository/,O=GoDaddy.com\, Inc.,L=Scottsdale,ST=A
,→rizona,C=US
public key size (bits) | 2048
serial | 64BBBEECF3D5182D
signature algorithm | sha256WithRSAEncryption
subject | CN=unisoftindia.org
subject alternative names (SAN) | unisoftindia.org, www.unisoftindia.org
valid from | 2024-05-01 10:56:00 UTC
valid until | 2025-05-01 10:43:30 UTC

Solution:

Log Method
Details: SSL/TLS: Collect and Report Certificate Details
OID:1.3.6.1.4.1.25623.1.0.103692
Version used: 2024-06-14T05:05:48Z

Log (CVSS: 0.0)


NVT: SSL/TLS: Report Medium Cipher Suites

Summary
This routine reports all Medium SSL/TLS cipher suites accepted by a service.

Quality of Detection: 98
Vulnerability Detection Result
'Medium' cipher suites accepted by this service via the TLSv1.2 protocol:
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
'Medium' cipher suites accepted by this service via the TLSv1.3 protocol:
TLS_AES_128_CCM_SHA256
TLS_AES_128_GCM_SHA256

Solution:

Vulnerability Insight
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 69

. . . continued from previous page . . .


Any cipher suite considered to be secure for only the next 10 years is considered as medium.

Log Method
Details: SSL/TLS: Report Medium Cipher Suites
OID:1.3.6.1.4.1.25623.1.0.902816
Version used: 2024-06-14T05:05:48Z

Log (CVSS: 0.0)


NVT: SSL/TLS: Report Non Weak Cipher Suites

Summary
This routine reports all Non Weak SSL/TLS cipher suites accepted by a service.

Quality of Detection: 98
Vulnerability Detection Result
'Non Weak' cipher suites accepted by this service via the TLSv1.2 protocol:
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
'Non Weak' cipher suites accepted by this service via the TLSv1.3 protocol:
TLS_AES_128_CCM_SHA256
TLS_AES_128_GCM_SHA256
TLS_AES_256_GCM_SHA384
TLS_CHACHA20_POLY1305_SHA256

Solution:

Log Method
Details: SSL/TLS: Report Non Weak Cipher Suites
OID:1.3.6.1.4.1.25623.1.0.103441
Version used: 2024-06-14T05:05:48Z

Log (CVSS: 0.0)


NVT: SSL/TLS: Report Perfect Forward Secrecy (PFS) Cipher Suites

Summary
This routine reports all SSL/TLS cipher suites accepted by a service which are supporting Perfect
Forward Secrecy (PFS).

Quality of Detection: 98
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 70

. . . continued from previous page . . .


Vulnerability Detection Result
Cipher suites supporting Perfect Forward Secrecy (PFS) are accepted by this serv
,→ice via the TLSv1.2 protocol:
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
Cipher suites supporting Perfect Forward Secrecy (PFS) are accepted by this serv
,→ice via the TLSv1.3 protocol:
TLS_AES_128_CCM_SHA256
TLS_AES_128_GCM_SHA256
TLS_AES_256_GCM_SHA384
TLS_CHACHA20_POLY1305_SHA256

Solution:

Log Method
Details: SSL/TLS: Report Perfect Forward Secrecy (PFS) Cipher Suites
OID:1.3.6.1.4.1.25623.1.0.105018
Version used: 2024-06-14T05:05:48Z

Log (CVSS: 0.0)


NVT: SSL/TLS: Report Supported Cipher Suites

Summary
This routine reports all SSL/TLS cipher suites accepted by a service.

Quality of Detection: 98
Vulnerability Detection Result
'Strong' cipher suites accepted by this service via the TLSv1.2 protocol:
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
'Medium' cipher suites accepted by this service via the TLSv1.2 protocol:
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
No 'Weak' cipher suites accepted by this service via the TLSv1.2 protocol.
No 'Null' cipher suites accepted by this service via the TLSv1.2 protocol.
No 'Anonymous' cipher suites accepted by this service via the TLSv1.2 protocol.
'Strong' cipher suites accepted by this service via the TLSv1.3 protocol:
TLS_AES_256_GCM_SHA384
TLS_CHACHA20_POLY1305_SHA256
'Medium' cipher suites accepted by this service via the TLSv1.3 protocol:
TLS_AES_128_CCM_SHA256
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 71

. . . continued from previous page . . .


TLS_AES_128_GCM_SHA256
No 'Weak' cipher suites accepted by this service via the TLSv1.3 protocol.
No 'Null' cipher suites accepted by this service via the TLSv1.3 protocol.
No 'Anonymous' cipher suites accepted by this service via the TLSv1.3 protocol.

Solution:

Vulnerability Insight
Notes:
- As the VT 'SSL/TLS: Check Supported Cipher Suites' (OID: 1.3.6.1.4.1.25623.1.0.900234)
might run into a timeout the actual reporting of all accepted cipher suites takes place in this VT
instead.
- SSLv2 ciphers are not getting reported as the protocol itself is deprecated, needs to be considered
as weak and is reported separately as deprecated.

Log Method
Details: SSL/TLS: Report Supported Cipher Suites
OID:1.3.6.1.4.1.25623.1.0.802067
Version used: 2024-06-14T05:05:48Z

Log (CVSS: 0.0)


NVT: SSL/TLS: Version Detection

Summary
Enumeration and reporting of SSL/TLS protocol versions supported by a remote service.

Quality of Detection: 80
Vulnerability Detection Result
The remote SSL/TLS service supports the following SSL/TLS protocol version(s):
TLSv1.2
TLSv1.3

Solution:

Log Method
Sends multiple connection requests to the remote service and attempts to determine the SSL/TLS
protocol versions supported by the service from the replies.
Note: The supported SSL/TLS protocol versions included in the report of this VT are reported
independently from the allowed / supported SSL/TLS ciphers.
Details: SSL/TLS: Version Detection
OID:1.3.6.1.4.1.25623.1.0.105782
Version used: 2024-06-14T05:05:48Z

Generated by HostedScan
2 RESULTS PER HOST 72

[ return to 43.255.154.27 ]

2.1.16 Log 80/tcp

Log (CVSS: 0.0)


NVT: elFinder Detection (HTTP)

Summary
HTTP based detection of elFinder.

Quality of Detection: 80
Vulnerability Detection Result
Detected elFinder
Version: unknown
Location: /
CPE: cpe:/a:std42:elfinder

Solution:

Log Method
Details: elFinder Detection (HTTP)
OID:1.3.6.1.4.1.25623.1.0.113323
Version used: 2023-03-01T10:20:05Z

References
url: https://studio-42.github.io/elFinder/

Log (CVSS: 0.0)


NVT: HTTP Security Headers Detection

Summary
All known security headers are being checked on the remote web server.
On completion a report will hand back whether a specic security header has been implemented
(including its value and if it is deprecated) or is missing on the target.

Quality of Detection: 80
Vulnerability Detection Result
Missing Headers | More Information
--------------------------------------------------------------------------------
,→------------------------------------------------------------------------------
,→------------------------------------------------
Content-Security-Policy | https://owasp.org/www-project-secure-headers
,→/#content-security-policy
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 73

. . . continued from previous page . . .


Cross-Origin-Embedder-Policy | https://scotthelme.co.uk/coop-and-coep/, Not
,→e: This is an upcoming header
Cross-Origin-Opener-Policy | https://scotthelme.co.uk/coop-and-coep/, Not
,→e: This is an upcoming header
Cross-Origin-Resource-Policy | https://scotthelme.co.uk/coop-and-coep/, Not
,→e: This is an upcoming header
Document-Policy | https://w3c.github.io/webappsec-feature-poli
,→cy/document-policy#document-policy-http-header
Feature-Policy | https://owasp.org/www-project-secure-headers
,→/#feature-policy, Note: The Feature Policy header has been renamed to Permissi
,→ons Policy
Permissions-Policy | https://w3c.github.io/webappsec-feature-poli
,→cy/#permissions-policy-http-header-field
Referrer-Policy | https://owasp.org/www-project-secure-headers
,→/#referrer-policy
Sec-Fetch-Dest | https://developer.mozilla.org/en-US/docs/Web
,→/HTTP/Headers#fetch_metadata_request_headers, Note: This is a new header suppo
,→rted only in newer browsers like e.g. Firefox 90
Sec-Fetch-Mode | https://developer.mozilla.org/en-US/docs/Web
,→/HTTP/Headers#fetch_metadata_request_headers, Note: This is a new header suppo
,→rted only in newer browsers like e.g. Firefox 90
Sec-Fetch-Site | https://developer.mozilla.org/en-US/docs/Web
,→/HTTP/Headers#fetch_metadata_request_headers, Note: This is a new header suppo
,→rted only in newer browsers like e.g. Firefox 90
Sec-Fetch-User | https://developer.mozilla.org/en-US/docs/Web
,→/HTTP/Headers#fetch_metadata_request_headers, Note: This is a new header suppo
,→rted only in newer browsers like e.g. Firefox 90
X-Content-Type-Options | https://owasp.org/www-project-secure-headers
,→/#x-content-type-options
X-Frame-Options | https://owasp.org/www-project-secure-headers
,→/#x-frame-options
X-Permitted-Cross-Domain-Policies | https://owasp.org/www-project-secure-headers
,→/#x-permitted-cross-domain-policies
X-XSS-Protection | https://owasp.org/www-project-secure-headers
,→/#x-xss-protection, Note: Most major browsers have dropped / deprecated suppor
,→t for this header in 2020.

Solution:

Log Method
Details: HTTP Security Headers Detection
OID:1.3.6.1.4.1.25623.1.0.112081
Version used: 2021-07-14T06:19:43Z

References
url: https://owasp.org/www-project-secure-headers/
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 74

. . . continued from previous page . . .


url: https://owasp.org/www-project-secure-headers/#div-headers
url: https://securityheaders.com/

Log (CVSS: 0.0)


NVT: HTTP Server type and version

Summary
This script detects and reports the HTTP Server's banner which might provide the type and
version of it.

Quality of Detection: 80
Vulnerability Detection Result
The remote HTTP Server banner is:
Server: Apache

Solution:

Log Method
Details: HTTP Server type and version
OID:1.3.6.1.4.1.25623.1.0.10107
Version used: 2023-08-01T13:29:10Z

Log (CVSS: 0.0)


NVT: robot.txt / robots.txt exists on the Web Server (HTTP)

Summary
Web Servers can use a le called /robot(s).txt to ask search engines to ignore certain les and
directories. By nature this le can not be used to protect private les from public read access.

Quality of Detection: 80
Vulnerability Detection Result
The file 'http://www.unisoftindia.org/robots.txt' contains the following:
User-agent: *
Disallow:
User-Agent: Googlebot
Allow: /
Sitemap: http://www.unisoftindia.org/sitemap.xml
Disallow: /admin/
Disallow: /fms-enquiry/
Disallow: /public/index.php/

Solution:
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 75

. . . continued from previous page . . .


Solution type: Mitigation
Review the content of the /robot(s).txt le and consider removing the les from the server or
protect them in other ways in case you actually intended non-public availability.

Vulnerability Insight
Any serious web search engine will honor the /robot(s).txt le and not scan the les and direc-
tories listed there.
Any entries listed in this le are not even hidden anymore.

Log Method
Details: robot.txt / robots.txt exists on the Web Server (HTTP)
OID:1.3.6.1.4.1.25623.1.0.10302
Version used: 2024-02-26T14:36:40Z

References
url: https://www.robotstxt.org/
url: https://www.robotstxt.org/norobots-rfc.txt

Log (CVSS: 0.0)


NVT: Services

Summary
This plugin performs service detection.

Quality of Detection: 80
Vulnerability Detection Result
A web server is running on this port

Solution:

Vulnerability Insight
This plugin attempts to guess which service is running on the remote port(s). For instance,
it searches for a web server which could listen on another port than 80 or 443 and makes this
information available for other check routines.

Log Method
Details: Services
OID:1.3.6.1.4.1.25623.1.0.10330
Version used: 2023-06-14T05:05:19Z

. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 76

. . . continued from previous page . . .

Log (CVSS: 0.0)


NVT: SSL/TLS: HPKP / HSTS / Expect-CT Headers sent via plain HTTP

Summary
This script checks if the remote HTTP server is sending a HPKP, HSTS and/or Expect-CT
header via plain HTTP.
Note: Most major browsers have dropped / deprecated support for this header in 2020.

Quality of Detection: 80
Vulnerability Detection Result
The remote HTTP server is sending HPKP, HSTS and/or Expect-CT headers via plain
,→HTTP.
HSTS-Header:
Strict-Transport-Security: max-age=31536000; preload

Solution:
Solution type: Workaround
Congure the remote host to only send HPKP, HSTS and Expect-CT headers via HTTPS.
Sending those headers via plain HTTP doesn't comply with the referenced RFCs.

Log Method
Details: SSL/TLS: HPKP / HSTS / Expect-CT Headers sent via plain HTTP
OID:1.3.6.1.4.1.25623.1.0.108248
Version used: 2023-07-25T05:05:58Z

References
url: https://owasp.org/www-project-cheat-sheets/cheatsheets/HTTP_Strict_Transpor
,→t_Security_Cheat_Sheet.html
url: https://owasp.org/www-project-secure-headers/
url: https://owasp.org/www-project-secure-headers/#public-key-pinning-extension-
,→for-http-hpkp
url: https://owasp.org/www-project-secure-headers/#http-strict-transport-securit
,→y-hsts
url: https://owasp.org/www-project-secure-headers/#expect-ct
url: https://tools.ietf.org/html/rfc6797
url: https://tools.ietf.org/html/rfc7469
url: https://securityheaders.io/
url: http://httpwg.org/http-extensions/expect-ct.html#http-request-type

Log (CVSS: 0.0)


NVT: Web Application Scanning Consolidation / Info Reporting

Summary
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 77

. . . continued from previous page . . .


The script consolidates and reports various information for web application (formerly called
'CGI') scanning.
This information is based on the following scripts / settings:
- HTTP-Version Detection (OID: 1.3.6.1.4.1.25623.1.0.100034)
- No 404 check (OID: 1.3.6.1.4.1.25623.1.0.10386)
- Web mirroring / webmirror.nasl (OID: 1.3.6.1.4.1.25623.1.0.10662)
- Directory Scanner / DDI_Directory_Scanner.nasl (OID: 1.3.6.1.4.1.25623.1.0.11032)
- The congured 'cgi_path' within the 'Scanner Preferences' of the scan cong in use
- The congured 'Enable CGI scanning', 'Enable generic web application scanning' and 'Add
historic /scripts and /cgi-bin to directories for CGI scanning' within the 'Global variable settings'
of the scan cong in use
If you think any of this information is wrong please report it to the referenced community forum.

Quality of Detection: 80
Vulnerability Detection Result
The Hostname/IP "www.unisoftindia.org" was used to access the remote host.
Generic web application scanning is disabled for this host via the "Enable gener
,→ic web application scanning" option within the "Global variable settings" of t
,→he scan config in use.
Requests to this service are done via HTTP/1.1.
This service seems to be able to host PHP scripts.
This service seems to be able to host ASP scripts.
The User-Agent "Mozilla/5.0 [en] (X11, U; OpenVAS-VT 21.4.3)" was used to access
,→ the remote host.
Historic /scripts and /cgi-bin are not added to the directories used for web app
,→lication scanning. You can enable this again with the "Add historic /scripts a
,→nd /cgi-bin to directories for CGI scanning" option within the "Global variabl
,→e settings" of the scan config in use.
The following directories were used for web application scanning:
http://www.unisoftindia.org/
While this is not, in and of itself, a bug, you should manually inspect these di
,→rectories to ensure that they are in compliance with company security standard
,→s

Solution:

Log Method
Details: Web Application Scanning Consolidation / Info Reporting
OID:1.3.6.1.4.1.25623.1.0.111038
Version used: 2024-07-03T06:48:05Z

References
url: https://forum.greenbone.net/c/vulnerability-tests/7

[ return to 43.255.154.27 ]

Generated by HostedScan
2 RESULTS PER HOST 78

2.1.17 Log 22/tcp

Log (CVSS: 0.0)


NVT: Services

Summary
This plugin performs service detection.

Quality of Detection: 80
Vulnerability Detection Result
An ssh server is running on this port

Solution:

Vulnerability Insight
This plugin attempts to guess which service is running on the remote port(s). For instance,
it searches for a web server which could listen on another port than 80 or 443 and makes this
information available for other check routines.

Log Method
Details: Services
OID:1.3.6.1.4.1.25623.1.0.10330
Version used: 2023-06-14T05:05:19Z

Log (CVSS: 0.0)


NVT: SSH Protocol Algorithms Supported

Summary
This script detects which algorithms are supported by the remote SSH service.

Quality of Detection: 80
Vulnerability Detection Result
The following options are supported by the remote SSH service:
kex_algorithms:
curve25519-sha256,[email protected],ecdh-sha2-nistp256,ecdh-sha2-nist
,→p384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-gr
,→oup14-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffi
,→e-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,kex-strict-s-v00@ope
,→nssh.com
server_host_key_algorithms:
rsa-sha2-512,rsa-sha2-256,ssh-rsa,[email protected],rsa-sha2-256
,→[email protected],[email protected],ecdsa-sha2-nistp256,ecdsa-s
,→[email protected],ssh-ed25519,[email protected]
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 79

. . . continued from previous page . . .


encryption_algorithms_client_to_server:
[email protected],[email protected],aes256-ctr,aes256-cbc,aes12
,→[email protected],aes128-ctr,aes128-cbc
encryption_algorithms_server_to_client:
[email protected],[email protected],aes256-ctr,aes256-cbc,aes12
,→[email protected],aes128-ctr,aes128-cbc
mac_algorithms_client_to_server:
[email protected],[email protected],[email protected]
,→,[email protected],hmac-sha2-256,hmac-sha1,[email protected],hm
,→ac-sha2-512
mac_algorithms_server_to_client:
[email protected],[email protected],[email protected]
,→,[email protected],hmac-sha2-256,hmac-sha1,[email protected],hm
,→ac-sha2-512
compression_algorithms_client_to_server:
none,[email protected]
compression_algorithms_server_to_client:
none,[email protected]

Solution:

Log Method
Details: SSH Protocol Algorithms Supported
OID:1.3.6.1.4.1.25623.1.0.105565
Version used: 2024-06-17T08:31:37Z

Log (CVSS: 0.0)


NVT: SSH Protocol Versions Supported

Summary
Identication of SSH protocol versions supported by the remote SSH Server. Also reads the
corresponding ngerprints from the service.

Quality of Detection: 95
Vulnerability Detection Result
The remote SSH Server supports the following SSH Protocol Versions:
1.99
2.0
SSHv2 Fingerprint(s):
ecdsa-sha2-nistp256: 51:7a:df:b7:2b:90:bb:a1:e5:1b:53:e0:23:e2:c3:ef
ssh-ed25519: 52:f6:1d:0e:87:bf:81:59:3b:9b:d7:ed:ad:7c:29:46
ssh-rsa: 52:b7:12:fd:ef:9d:95:50:85:e9:aa:d1:bd:e6:ef:68

Solution:
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 80

. . . continued from previous page . . .

Log Method
The following versions are tried: 1.33, 1.5, 1.99 and 2.0.
Details: SSH Protocol Versions Supported
OID:1.3.6.1.4.1.25623.1.0.100259
Version used: 2024-06-17T08:31:37Z

Log (CVSS: 0.0)


NVT: SSH Server type and version

Summary
This detects the SSH Server's type and version by connecting to the server and processing the
buer received.

Quality of Detection: 80
Vulnerability Detection Result
Remote SSH server banner: SSH-2.0-OpenSSH_8.0
Remote SSH supported authentication: password,publickey
Remote SSH text/login banner: (not available)
This is probably:
- OpenSSH
Concluded from remote connection attempt with credentials:
Login: OpenVASVT
Password: OpenVASVT

Solution:

Vulnerability Insight
This information gives potential attackers additional information about the system they are
attacking. Versions and Types should be omitted where possible.

Log Method
Details: SSH Server type and version
OID:1.3.6.1.4.1.25623.1.0.10267
Version used: 2024-06-10T05:05:40Z

[ return to 43.255.154.27 ]

2.1.18 Log 465/tcp

Generated by HostedScan
2 RESULTS PER HOST 81

Log (CVSS: 0.0)


NVT: Services

Summary
This plugin performs service detection.

Quality of Detection: 80
Vulnerability Detection Result
An unknown service is running on this port.
It is usually reserved for SMTPS

Solution:

Vulnerability Insight
This plugin attempts to guess which service is running on the remote port(s). For instance,
it searches for a web server which could listen on another port than 80 or 443 and makes this
information available for other check routines.

Log Method
Details: Services
OID:1.3.6.1.4.1.25623.1.0.10330
Version used: 2023-06-14T05:05:19Z

Log (CVSS: 0.0)


NVT: SSL/TLS: Collect and Report Certicate Details

Summary
This script collects and reports the details of all SSL/TLS certicates.
This data will be used by other tests to verify server certicates.

Quality of Detection: 98
Vulnerability Detection Result
The following certificate details of the remote service were collected.
Certificate details:
fingerprint (SHA-1) | B84E1827B136A8486244AEEE4F16AE2670E6DA49
fingerprint (SHA-256) | 28AB1C338D758F90F3B028FEE86033C303C5B11A3A0D19
,→598AA913C6D27DE14A
issued by | CN=Go Daddy Secure Certificate Authority - G2,
,→OU=http://certs.godaddy.com/repository/,O=GoDaddy.com\, Inc.,L=Scottsdale,ST=A
,→rizona,C=US
public key size (bits) | 2048
serial | 64BBBEECF3D5182D
signature algorithm | sha256WithRSAEncryption
subject | CN=unisoftindia.org
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 82

. . . continued from previous page . . .


subject alternative names (SAN) | unisoftindia.org, www.unisoftindia.org
valid from | 2024-05-01 10:56:00 UTC
valid until | 2025-05-01 10:43:30 UTC

Solution:

Log Method
Details: SSL/TLS: Collect and Report Certificate Details
OID:1.3.6.1.4.1.25623.1.0.103692
Version used: 2024-06-14T05:05:48Z

Log (CVSS: 0.0)


NVT: SSL/TLS: Report Non Weak Cipher Suites

Summary
This routine reports all Non Weak SSL/TLS cipher suites accepted by a service.

Quality of Detection: 98
Vulnerability Detection Result
'Non Weak' cipher suites accepted by this service via the TLSv1.2 protocol:
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256

Solution:

Log Method
Details: SSL/TLS: Report Non Weak Cipher Suites
OID:1.3.6.1.4.1.25623.1.0.103441
Version used: 2024-06-14T05:05:48Z

Log (CVSS: 0.0)


NVT: SSL/TLS: Report Perfect Forward Secrecy (PFS) Cipher Suites

Summary
This routine reports all SSL/TLS cipher suites accepted by a service which are supporting Perfect
Forward Secrecy (PFS).

Quality of Detection: 98
Vulnerability Detection Result
Cipher suites supporting Perfect Forward Secrecy (PFS) are accepted by this serv
,→ice via the TLSv1.2 protocol:
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 83

. . . continued from previous page . . .

Solution:

Log Method
Details: SSL/TLS: Report Perfect Forward Secrecy (PFS) Cipher Suites
OID:1.3.6.1.4.1.25623.1.0.105018
Version used: 2024-06-14T05:05:48Z

Log (CVSS: 0.0)


NVT: SSL/TLS: Report Supported Cipher Suites

Summary
This routine reports all SSL/TLS cipher suites accepted by a service.

Quality of Detection: 98
Vulnerability Detection Result
'Strong' cipher suites accepted by this service via the TLSv1.2 protocol:
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
No 'Medium' cipher suites accepted by this service via the TLSv1.2 protocol.
No 'Weak' cipher suites accepted by this service via the TLSv1.2 protocol.
No 'Null' cipher suites accepted by this service via the TLSv1.2 protocol.
No 'Anonymous' cipher suites accepted by this service via the TLSv1.2 protocol.

Solution:

Vulnerability Insight
Notes:
- As the VT 'SSL/TLS: Check Supported Cipher Suites' (OID: 1.3.6.1.4.1.25623.1.0.900234)
might run into a timeout the actual reporting of all accepted cipher suites takes place in this VT
instead.
- SSLv2 ciphers are not getting reported as the protocol itself is deprecated, needs to be considered
as weak and is reported separately as deprecated.

Log Method
Details: SSL/TLS: Report Supported Cipher Suites
OID:1.3.6.1.4.1.25623.1.0.802067
Version used: 2024-06-14T05:05:48Z

Log (CVSS: 0.0)


NVT: SSL/TLS: Version Detection

Summary
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 84

. . . continued from previous page . . .


Enumeration and reporting of SSL/TLS protocol versions supported by a remote service.

Quality of Detection: 80
Vulnerability Detection Result
The remote SSL/TLS service supports the following SSL/TLS protocol version(s):
TLSv1.2

Solution:

Log Method
Sends multiple connection requests to the remote service and attempts to determine the SSL/TLS
protocol versions supported by the service from the replies.
Note: The supported SSL/TLS protocol versions included in the report of this VT are reported
independently from the allowed / supported SSL/TLS ciphers.
Details: SSL/TLS: Version Detection
OID:1.3.6.1.4.1.25623.1.0.105782
Version used: 2024-06-14T05:05:48Z

[ return to 43.255.154.27 ]

2.1.19 Log 21/tcp

Log (CVSS: 0.0)


NVT: FTP Banner Detection

Summary
This script detects and reports a FTP Server Banner.

Quality of Detection: 80
Vulnerability Detection Result
Remote FTP server banner:
220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
220-You are user number 2 of 50 allowed.
220-Local time is now 08:07. Server port: 21.
220-This is a private system - No anonymous login
220-IPv6 connections are also welcome on this server.
220 You will be disconnected after 15 minutes of inactivity.
This is probably (a):
- Pure-FTPd
- Various FTP servers (e.g. Zyxel Access Points)
Server operating system information collected via "SYST" command:
215 UNIX Type: L8
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 85

. . . continued from previous page . . .

Solution:

Log Method
Details: FTP Banner Detection
OID:1.3.6.1.4.1.25623.1.0.10092
Version used: 2024-06-07T15:38:39Z

Log (CVSS: 0.0)


NVT: Pure-FTPd FTP Server Detection

Summary
The script is grabbing the banner of a FTP server and sends a 'HELP' command to identify a
Pure-FTPd FTP Server from the reply.

Quality of Detection: 80
Vulnerability Detection Result
Detected Pure-FTPd
Version: unknown
Location: 21/tcp
CPE: cpe:/a:pureftpd:pure-ftpd
Concluded from version/product identification result:
220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
220-You are user number 2 of 50 allowed.
220-Local time is now 08:07. Server port: 21.
220-This is a private system - No anonymous login
220-IPv6 connections are also welcome on this server.
220 You will be disconnected after 15 minutes of inactivity.

Solution:

Log Method
Details: Pure-FTPd FTP Server Detection
OID:1.3.6.1.4.1.25623.1.0.111110
Version used: 2023-07-26T05:05:09Z

References
url: https://www.pureftpd.org

Log (CVSS: 0.0)


NVT: Services

. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 86

. . . continued from previous page . . .


Summary
This plugin performs service detection.

Quality of Detection: 80
Vulnerability Detection Result
An FTP server is running on this port.
Here is its banner :
220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------

Solution:

Vulnerability Insight
This plugin attempts to guess which service is running on the remote port(s). For instance,
it searches for a web server which could listen on another port than 80 or 443 and makes this
information available for other check routines.

Log Method
Details: Services
OID:1.3.6.1.4.1.25623.1.0.10330
Version used: 2023-06-14T05:05:19Z

Log (CVSS: 0.0)


NVT: SSL/TLS: Certicate - Subject Common Name Does Not Match Server FQDN

Summary
The SSL/TLS certicate contains a common name (CN) that does not match the hostname.

Quality of Detection: 98
Vulnerability Detection Result
The certificate of the remote service contains a common name (CN) that does not
,→match the hostname "www.unisoftindia.org".
Certificate details:
fingerprint (SHA-1) | 2AC95F2EB27BB3B3B90A417B5747D6FC2A665462
fingerprint (SHA-256) | EF17BFD6047B67C9F16629865D56B9DF6E6AB8533E32A2
,→2D54BFF2E284FE85B8
issued by | CN=Starfield Secure Certificate Authority - G2
,→,OU=http://certs.starfieldtech.com/repository/,O=Starfield Technologies\, Inc.
,→,L=Scottsdale,ST=Arizona,C=US
public key size (bits) | 2048
serial | 64DB1B5E933AAEF8
signature algorithm | sha256WithRSAEncryption
subject | CN=*.prod.sin2.secureserver.net
subject alternative names (SAN) | *.prod.sin2.secureserver.net, prod.sin2.secure
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 87

. . . continued from previous page . . .


,→server.net
valid from | 2024-02-16 18:09:08 UTC
valid until | 2025-03-19 18:09:08 UTC

Solution:

Log Method
Details: SSL/TLS: Certificate - Subject Common Name Does Not Match Server FQDN
OID:1.3.6.1.4.1.25623.1.0.103141
Version used: 2024-06-14T05:05:48Z

Log (CVSS: 0.0)


NVT: SSL/TLS: Collect and Report Certicate Details

Summary
This script collects and reports the details of all SSL/TLS certicates.
This data will be used by other tests to verify server certicates.

Quality of Detection: 98
Vulnerability Detection Result
The following certificate details of the remote service were collected.
Certificate details:
fingerprint (SHA-1) | B84E1827B136A8486244AEEE4F16AE2670E6DA49
fingerprint (SHA-256) | 28AB1C338D758F90F3B028FEE86033C303C5B11A3A0D19
,→598AA913C6D27DE14A
issued by | CN=Go Daddy Secure Certificate Authority - G2,
,→OU=http://certs.godaddy.com/repository/,O=GoDaddy.com\, Inc.,L=Scottsdale,ST=A
,→rizona,C=US
public key size (bits) | 2048
serial | 64BBBEECF3D5182D
signature algorithm | sha256WithRSAEncryption
subject | CN=unisoftindia.org
subject alternative names (SAN) | unisoftindia.org, www.unisoftindia.org
valid from | 2024-05-01 10:56:00 UTC
valid until | 2025-05-01 10:43:30 UTC

Solution:

Log Method
Details: SSL/TLS: Collect and Report Certificate Details
OID:1.3.6.1.4.1.25623.1.0.103692
Version used: 2024-06-14T05:05:48Z

Generated by HostedScan
2 RESULTS PER HOST 88

Log (CVSS: 0.0)


NVT: SSL/TLS: FTP 'AUTH TLS' Command Detection

Summary
Checks if the remote FTP server supports SSL/TLS (FTPS) with the 'AUTH TLS' command.

Quality of Detection: 80
Vulnerability Detection Result
The remote FTP server supports TLS (FTPS) with the 'AUTH TLS' command.

Solution:

Log Method
Details: SSL/TLS: FTP 'AUTH TLS' Command Detection
OID:1.3.6.1.4.1.25623.1.0.105009
Version used: 2023-07-26T05:05:09Z

References
url: https://tools.ietf.org/html/rfc4217

Log (CVSS: 0.0)


NVT: SSL/TLS: Report Medium Cipher Suites

Summary
This routine reports all Medium SSL/TLS cipher suites accepted by a service.

Quality of Detection: 98
Vulnerability Detection Result
'Medium' cipher suites accepted by this service via the TLSv1.2 protocol:
TLS_DHE_RSA_WITH_AES_256_CCM
TLS_DHE_RSA_WITH_AES_256_CCM_8
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
'Medium' cipher suites accepted by this service via the TLSv1.3 protocol:
TLS_AES_128_CCM_SHA256
TLS_AES_128_GCM_SHA256

Solution:

Vulnerability Insight
Any cipher suite considered to be secure for only the next 10 years is considered as medium.

Log Method
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 89

. . . continued from previous page . . .


Details: SSL/TLS: Report Medium Cipher Suites
OID:1.3.6.1.4.1.25623.1.0.902816
Version used: 2024-06-14T05:05:48Z

Log (CVSS: 0.0)


NVT: SSL/TLS: Report Non Weak Cipher Suites

Summary
This routine reports all Non Weak SSL/TLS cipher suites accepted by a service.

Quality of Detection: 98
Vulnerability Detection Result
'Non Weak' cipher suites accepted by this service via the TLSv1.2 protocol:
TLS_DHE_RSA_WITH_AES_256_CCM
TLS_DHE_RSA_WITH_AES_256_CCM_8
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
'Non Weak' cipher suites accepted by this service via the TLSv1.3 protocol:
TLS_AES_128_CCM_SHA256
TLS_AES_128_GCM_SHA256
TLS_AES_256_GCM_SHA384
TLS_CHACHA20_POLY1305_SHA256

Solution:

Log Method
Details: SSL/TLS: Report Non Weak Cipher Suites
OID:1.3.6.1.4.1.25623.1.0.103441
Version used: 2024-06-14T05:05:48Z

Log (CVSS: 0.0)


NVT: SSL/TLS: Report Perfect Forward Secrecy (PFS) Cipher Suites

Summary
This routine reports all SSL/TLS cipher suites accepted by a service which are supporting Perfect
Forward Secrecy (PFS).

Quality of Detection: 98
Vulnerability Detection Result
Cipher suites supporting Perfect Forward Secrecy (PFS) are accepted by this serv
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 90

. . . continued from previous page . . .


,→ice via the TLSv1.2 protocol:
TLS_DHE_RSA_WITH_AES_256_CCM
TLS_DHE_RSA_WITH_AES_256_CCM_8
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
Cipher suites supporting Perfect Forward Secrecy (PFS) are accepted by this serv
,→ice via the TLSv1.3 protocol:
TLS_AES_128_CCM_SHA256
TLS_AES_128_GCM_SHA256
TLS_AES_256_GCM_SHA384
TLS_CHACHA20_POLY1305_SHA256

Solution:

Log Method
Details: SSL/TLS: Report Perfect Forward Secrecy (PFS) Cipher Suites
OID:1.3.6.1.4.1.25623.1.0.105018
Version used: 2024-06-14T05:05:48Z

Log (CVSS: 0.0)


NVT: SSL/TLS: Report Supported Cipher Suites

Summary
This routine reports all SSL/TLS cipher suites accepted by a service.

Quality of Detection: 98
Vulnerability Detection Result
'Strong' cipher suites accepted by this service via the TLSv1.2 protocol:
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
'Medium' cipher suites accepted by this service via the TLSv1.2 protocol:
TLS_DHE_RSA_WITH_AES_256_CCM
TLS_DHE_RSA_WITH_AES_256_CCM_8
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
No 'Weak' cipher suites accepted by this service via the TLSv1.2 protocol.
No 'Null' cipher suites accepted by this service via the TLSv1.2 protocol.
No 'Anonymous' cipher suites accepted by this service via the TLSv1.2 protocol.
'Strong' cipher suites accepted by this service via the TLSv1.3 protocol:
TLS_AES_256_GCM_SHA384
TLS_CHACHA20_POLY1305_SHA256
'Medium' cipher suites accepted by this service via the TLSv1.3 protocol:
TLS_AES_128_CCM_SHA256
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 91

. . . continued from previous page . . .


TLS_AES_128_GCM_SHA256
No 'Weak' cipher suites accepted by this service via the TLSv1.3 protocol.
No 'Null' cipher suites accepted by this service via the TLSv1.3 protocol.
No 'Anonymous' cipher suites accepted by this service via the TLSv1.3 protocol.

Solution:

Vulnerability Insight
Notes:
- As the VT 'SSL/TLS: Check Supported Cipher Suites' (OID: 1.3.6.1.4.1.25623.1.0.900234)
might run into a timeout the actual reporting of all accepted cipher suites takes place in this VT
instead.
- SSLv2 ciphers are not getting reported as the protocol itself is deprecated, needs to be considered
as weak and is reported separately as deprecated.

Log Method
Details: SSL/TLS: Report Supported Cipher Suites
OID:1.3.6.1.4.1.25623.1.0.802067
Version used: 2024-06-14T05:05:48Z

Log (CVSS: 0.0)


NVT: SSL/TLS: Version Detection

Summary
Enumeration and reporting of SSL/TLS protocol versions supported by a remote service.

Quality of Detection: 80
Vulnerability Detection Result
The remote SSL/TLS service supports the following SSL/TLS protocol version(s):
TLSv1.2
TLSv1.3

Solution:

Log Method
Sends multiple connection requests to the remote service and attempts to determine the SSL/TLS
protocol versions supported by the service from the replies.
Note: The supported SSL/TLS protocol versions included in the report of this VT are reported
independently from the allowed / supported SSL/TLS ciphers.
Details: SSL/TLS: Version Detection
OID:1.3.6.1.4.1.25623.1.0.105782
Version used: 2024-06-14T05:05:48Z

Generated by HostedScan
2 RESULTS PER HOST 92

[ return to 43.255.154.27 ]

2.1.20 Log 143/tcp

Log (CVSS: 0.0)


NVT: IMAP Server type and version

Summary
This detects the IMAP Server's type and version by connecting to the server and processing the
received banner.

Quality of Detection: 80
Vulnerability Detection Result
Remote IMAP server banner:
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE NAMESPACE LITE
,→RAL+ STARTTLS AUTH=PLAIN AUTH=LOGIN] Dovecot ready.
* ID ("name" "Dovecot")
This is probably:
- Dovecot
The remote IMAP server is announcing the following available CAPABILITIES via an
,→ unencrypted connection:
AUTH=LOGIN, AUTH=PLAIN, ENABLE, ID, IDLE, LITERAL+, LOGIN-REFERRALS, NAMESPACE,
,→SASL-IR, STARTTLS

Solution:

Log Method
Details: IMAP Server type and version
OID:1.3.6.1.4.1.25623.1.0.11414
Version used: 2023-08-01T13:29:10Z

Log (CVSS: 0.0)


NVT: Services

Summary
This plugin performs service detection.

Quality of Detection: 80
Vulnerability Detection Result
An IMAP server is running on this port

Solution:
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 93

. . . continued from previous page . . .

Vulnerability Insight
This plugin attempts to guess which service is running on the remote port(s). For instance,
it searches for a web server which could listen on another port than 80 or 443 and makes this
information available for other check routines.

Log Method
Details: Services
OID:1.3.6.1.4.1.25623.1.0.10330
Version used: 2023-06-14T05:05:19Z

Log (CVSS: 0.0)


NVT: SSL/TLS: IMAP 'STARTTLS' Command Detection

Summary
Checks if the remote IMAP server supports SSL/TLS with the 'STARTTLS' command.

Quality of Detection: 80
Vulnerability Detection Result
The remote IMAP server supports SSL/TLS with the 'STARTTLS' command.
The remote IMAP server is announcing the following CAPABILITIES before sending t
,→he 'STARTTLS' command:
AUTH=LOGIN, AUTH=PLAIN, ENABLE, ID, IDLE, LITERAL+, LOGIN-REFERRALS, NAMESPACE,
,→SASL-IR, STARTTLS
The remote IMAP server is announcing the following CAPABILITIES after sending th
,→e 'STARTTLS' command:
AUTH=LOGIN, AUTH=PLAIN, ENABLE, ID, IDLE, LITERAL+, LOGIN-REFERRALS, NAMESPACE,
,→SASL-IR

Solution:

Log Method
Details: SSL/TLS: IMAP 'STARTTLS' Command Detection
OID:1.3.6.1.4.1.25623.1.0.105007
Version used: 2021-11-12T09:42:39Z

References
url: https://tools.ietf.org/html/rfc2595

[ return to 43.255.154.27 ]

2.1.21 Log 2086/tcp

Generated by HostedScan
2 RESULTS PER HOST 94

Log (CVSS: 0.0)


NVT: Response Time / No 404 Error Code Check

Summary
This VT tests if the remote web server does not reply with a 404 error code and checks if it is
replying to the scanners requests in a reasonable amount of time.

Quality of Detection: 80
Vulnerability Detection Result
The remote web server is very slow - it took 61 seconds (Maximum response time c
,→onfigured in 'Response Time / No 404 Error Code Check' (OID: 1.3.6.1.4.1.25623
,→.1.0.10386) preferences: 60 seconds) to execute the plugin no404.nasl (it usua
,→lly only takes a few seconds).
In order to keep the scan total time to a reasonable amount, the remote web serv
,→er has not been tested.
If the remote server should be tested it has to be fixed to have it reply to the
,→ scanners requests in a reasonable amount of time. Alternatively the 'Maximum
,→response time (in seconds)' preference could be raised to a higher value if lo
,→nger scan times are accepted.

Solution:

Vulnerability Insight
This web server might show the following issues:
- it is [mis]congured in that it does not return '404 Not Found' error codes when a non-existent
le is requested, perhaps returning a site map, search page, authentication page or redirect
instead.
The Scanner might enabled some counter measures for that, however they might be insucient.
If a great number of security issues are reported for this port, they might not all be accurate.
- it doesn't response in a reasonable amount of time to various HTTP requests sent by this VT.
In order to keep the scan total time to a reasonable amount, the remote web server might not be
tested. If the remote server should be tested it has to be xed to have it reply to the scanners
requests in a reasonable amount of time.
Alternatively the 'Maximum response time (in seconds)' preference could be raised to a higher
value if longer scan times are accepted.

Log Method
Details: Response Time / No 404 Error Code Check
OID:1.3.6.1.4.1.25623.1.0.10386
Version used: 2023-07-07T05:05:26Z

Log (CVSS: 0.0)


NVT: Response Time / No 404 Error Code Check

Summary
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 95

. . . continued from previous page . . .


This VT tests if the remote web server does not reply with a 404 error code and checks if it is
replying to the scanners requests in a reasonable amount of time.

Quality of Detection: 80
Vulnerability Detection Result
The host returns a 30x (e.g. 301) error code when a non-existent file is request
,→ed. Some HTTP-related checks have been disabled.

Solution:

Vulnerability Insight
This web server might show the following issues:
- it is [mis]congured in that it does not return '404 Not Found' error codes when a non-existent
le is requested, perhaps returning a site map, search page, authentication page or redirect
instead.
The Scanner might enabled some counter measures for that, however they might be insucient.
If a great number of security issues are reported for this port, they might not all be accurate.
- it doesn't response in a reasonable amount of time to various HTTP requests sent by this VT.
In order to keep the scan total time to a reasonable amount, the remote web server might not be
tested. If the remote server should be tested it has to be xed to have it reply to the scanners
requests in a reasonable amount of time.
Alternatively the 'Maximum response time (in seconds)' preference could be raised to a higher
value if longer scan times are accepted.

Log Method
Details: Response Time / No 404 Error Code Check
OID:1.3.6.1.4.1.25623.1.0.10386
Version used: 2023-07-07T05:05:26Z

Log (CVSS: 0.0)


NVT: Services

Summary
This plugin performs service detection.

Quality of Detection: 80
Vulnerability Detection Result
A web server is running on this port

Solution:

Vulnerability Insight
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 96

. . . continued from previous page . . .


This plugin attempts to guess which service is running on the remote port(s). For instance,
it searches for a web server which could listen on another port than 80 or 443 and makes this
information available for other check routines.

Log Method
Details: Services
OID:1.3.6.1.4.1.25623.1.0.10330
Version used: 2023-06-14T05:05:19Z

Log (CVSS: 0.0)


NVT: Web Application Scanning Consolidation / Info Reporting

Summary
The script consolidates and reports various information for web application (formerly called
'CGI') scanning.
This information is based on the following scripts / settings:
- HTTP-Version Detection (OID: 1.3.6.1.4.1.25623.1.0.100034)
- No 404 check (OID: 1.3.6.1.4.1.25623.1.0.10386)
- Web mirroring / webmirror.nasl (OID: 1.3.6.1.4.1.25623.1.0.10662)
- Directory Scanner / DDI_Directory_Scanner.nasl (OID: 1.3.6.1.4.1.25623.1.0.11032)
- The congured 'cgi_path' within the 'Scanner Preferences' of the scan cong in use
- The congured 'Enable CGI scanning', 'Enable generic web application scanning' and 'Add
historic /scripts and /cgi-bin to directories for CGI scanning' within the 'Global variable settings'
of the scan cong in use
If you think any of this information is wrong please report it to the referenced community forum.

Quality of Detection: 80
Vulnerability Detection Result
The Hostname/IP "www.unisoftindia.org" was used to access the remote host.
Generic web application scanning is disabled for this host via the "Enable gener
,→ic web application scanning" option within the "Global variable settings" of t
,→he scan config in use.
This service is marked as broken and no web application scanning is launched aga
,→inst it. Reason(s):
-----
- The remote web server is very slow - it took 61 seconds (Maximum response tim
,→e configured in 'Response Time / No 404 Error Code Check' (OID: 1.3.6.1.4.1.25
,→623.1.0.10386) preferences: 60 seconds) to execute the plugin no404.nasl (it u
,→sually only takes a few seconds).
In order to keep the scan total time to a reasonable amount, the remote web serv
,→er has not been tested.
If the remote server should be tested it has to be fixed to have it reply to the
,→ scanners requests in a reasonable amount of time. Alternatively the 'Maximum
,→response time (in seconds)' preference could be raised to a higher value if lo
,→nger scan times are accepted.
-----
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 97

. . . continued from previous page . . .


Requests to this service are done via HTTP/1.1.
This service seems to be able to host PHP scripts.
This service seems to be able to host ASP scripts.
The User-Agent "Mozilla/5.0 [en] (X11, U; OpenVAS-VT 21.4.3)" was used to access
,→ the remote host.
Historic /scripts and /cgi-bin are not added to the directories used for web app
,→lication scanning. You can enable this again with the "Add historic /scripts a
,→nd /cgi-bin to directories for CGI scanning" option within the "Global variabl
,→e settings" of the scan config in use.
The following directories were used for web application scanning:
http://www.unisoftindia.org:2086/
While this is not, in and of itself, a bug, you should manually inspect these di
,→rectories to ensure that they are in compliance with company security standard
,→s

Solution:

Log Method
Details: Web Application Scanning Consolidation / Info Reporting
OID:1.3.6.1.4.1.25623.1.0.111038
Version used: 2024-07-03T06:48:05Z

References
url: https://forum.greenbone.net/c/vulnerability-tests/7

[ return to 43.255.154.27 ]

2.1.22 Log 2078/tcp

Log (CVSS: 0.0)


NVT: HTTP Security Headers Detection

Summary
All known security headers are being checked on the remote web server.
On completion a report will hand back whether a specic security header has been implemented
(including its value and if it is deprecated) or is missing on the target.

Quality of Detection: 80
Vulnerability Detection Result
Missing Headers | More Information
--------------------------------------------------------------------------------
,→------------------------------------------------------------------------------
,→------------------------------------------------------------------------------
,→----------
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 98

. . . continued from previous page . . .


Content-Security-Policy | https://owasp.org/www-project-secure-headers
,→/#content-security-policy
Cross-Origin-Embedder-Policy | https://scotthelme.co.uk/coop-and-coep/, Not
,→e: This is an upcoming header
Cross-Origin-Opener-Policy | https://scotthelme.co.uk/coop-and-coep/, Not
,→e: This is an upcoming header
Cross-Origin-Resource-Policy | https://scotthelme.co.uk/coop-and-coep/, Not
,→e: This is an upcoming header
Document-Policy | https://w3c.github.io/webappsec-feature-poli
,→cy/document-policy#document-policy-http-header
Expect-CT | https://owasp.org/www-project-secure-headers
,→/#expect-ct, Note: This is an upcoming header
Feature-Policy | https://owasp.org/www-project-secure-headers
,→/#feature-policy, Note: The Feature Policy header has been renamed to Permissi
,→ons Policy
Permissions-Policy | https://w3c.github.io/webappsec-feature-poli
,→cy/#permissions-policy-http-header-field
Public-Key-Pins | Please check the output of the VTs including
,→ 'SSL/TLS:' and 'HPKP' in their name for more information and configuration he
,→lp. Note: Most major browsers have dropped / deprecated support for this heade
,→r in 2020.
Referrer-Policy | https://owasp.org/www-project-secure-headers
,→/#referrer-policy
Sec-Fetch-Dest | https://developer.mozilla.org/en-US/docs/Web
,→/HTTP/Headers#fetch_metadata_request_headers, Note: This is a new header suppo
,→rted only in newer browsers like e.g. Firefox 90
Sec-Fetch-Mode | https://developer.mozilla.org/en-US/docs/Web
,→/HTTP/Headers#fetch_metadata_request_headers, Note: This is a new header suppo
,→rted only in newer browsers like e.g. Firefox 90
Sec-Fetch-Site | https://developer.mozilla.org/en-US/docs/Web
,→/HTTP/Headers#fetch_metadata_request_headers, Note: This is a new header suppo
,→rted only in newer browsers like e.g. Firefox 90
Sec-Fetch-User | https://developer.mozilla.org/en-US/docs/Web
,→/HTTP/Headers#fetch_metadata_request_headers, Note: This is a new header suppo
,→rted only in newer browsers like e.g. Firefox 90
Strict-Transport-Security | Please check the output of the VTs including
,→ 'SSL/TLS:' and 'HSTS' in their name for more information and configuration he
,→lp.
X-Content-Type-Options | https://owasp.org/www-project-secure-headers
,→/#x-content-type-options
X-Frame-Options | https://owasp.org/www-project-secure-headers
,→/#x-frame-options
X-Permitted-Cross-Domain-Policies | https://owasp.org/www-project-secure-headers
,→/#x-permitted-cross-domain-policies
X-XSS-Protection | https://owasp.org/www-project-secure-headers
,→/#x-xss-protection, Note: Most major browsers have dropped / deprecated suppor
,→t for this header in 2020.
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 99

. . . continued from previous page . . .

Solution:

Log Method
Details: HTTP Security Headers Detection
OID:1.3.6.1.4.1.25623.1.0.112081
Version used: 2021-07-14T06:19:43Z

References
url: https://owasp.org/www-project-secure-headers/
url: https://owasp.org/www-project-secure-headers/#div-headers
url: https://securityheaders.com/

Log (CVSS: 0.0)


NVT: HTTP Server type and version

Summary
This script detects and reports the HTTP Server's banner which might provide the type and
version of it.

Quality of Detection: 80
Vulnerability Detection Result
The remote HTTP Server banner is:
Server: cPanel

Solution:

Log Method
Details: HTTP Server type and version
OID:1.3.6.1.4.1.25623.1.0.10107
Version used: 2023-08-01T13:29:10Z

Log (CVSS: 0.0)


NVT: Services

Summary
This plugin performs service detection.

Quality of Detection: 80
Vulnerability Detection Result
A TLScustom server answered on this port
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 100

. . . continued from previous page . . .

Solution:

Vulnerability Insight
This plugin attempts to guess which service is running on the remote port(s). For instance,
it searches for a web server which could listen on another port than 80 or 443 and makes this
information available for other check routines.

Log Method
Details: Services
OID:1.3.6.1.4.1.25623.1.0.10330
Version used: 2023-06-14T05:05:19Z

Log (CVSS: 0.0)


NVT: Services

Summary
This plugin performs service detection.

Quality of Detection: 80
Vulnerability Detection Result
A web server is running on this port through SSL

Solution:

Vulnerability Insight
This plugin attempts to guess which service is running on the remote port(s). For instance,
it searches for a web server which could listen on another port than 80 or 443 and makes this
information available for other check routines.

Log Method
Details: Services
OID:1.3.6.1.4.1.25623.1.0.10330
Version used: 2023-06-14T05:05:19Z

Log (CVSS: 0.0)


NVT: SSL/TLS: HTTP Public Key Pinning (HPKP) Missing

Summary
The remote web server is not enforcing HTTP Public Key Pinning (HPKP).
Note: Most major browsers have dropped / deprecated support for this header in 2020.

. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 101

. . . continued from previous page . . .


Quality of Detection: 80
Vulnerability Detection Result
The remote web server is not enforcing HPKP.
HTTP-Banner:
HTTP/1.1 401 Unauthorized
Date: ***replaced***
Server: cPanel
Persistent-Auth: false
Host: www.unisoftindia.org:2078
Cache-Control: no-cache, no-store, must-revalidate, private
Connection: close
Vary: Accept-Encoding
WWW-Authenticate: Basic realm="Restricted Area"
Content-Length: ***replaced***
Content-Type: text/html; charset="utf-8"
Expires: ***replaced***

Solution:
Solution type: Workaround
Enable HPKP or add / congure the required directives correctly following the guides linked in
the references.
Note: Some web servers are not sending headers on specic status codes by default. Please review
your web server or application conguration to always send these headers on every response
independently from the status code.
- Apache: Use 'Header always set' instead of 'Header set'.
- nginx: Append the 'always' keyword to each 'add_header' directive.
For dierent applications or web severs please refer to the related documentation for a similar
conguration possibility.

Log Method
Details: SSL/TLS: HTTP Public Key Pinning (HPKP) Missing
OID:1.3.6.1.4.1.25623.1.0.108247
Version used: 2024-02-08T05:05:59Z

References
url: https://owasp.org/www-project-secure-headers/
url: https://owasp.org/www-project-secure-headers/#public-key-pinning-extension-
,→for-http-hpkp
url: https://tools.ietf.org/html/rfc7469
url: https://securityheaders.io/
url: https://httpd.apache.org/docs/current/mod/mod_headers.html#header
url: https://nginx.org/en/docs/http/ngx_http_headers_module.html#add_header

Generated by HostedScan
2 RESULTS PER HOST 102

Log (CVSS: 0.0)


NVT: SSL/TLS: HTTP Strict Transport Security (HSTS) Missing

Summary
The remote web server is not enforcing HTTP Strict Transport Security (HSTS).

Quality of Detection: 80
Vulnerability Detection Result
The remote web server is not enforcing HSTS.
HTTP-Banner:
HTTP/1.1 401 Unauthorized
Date: ***replaced***
Server: cPanel
Persistent-Auth: false
Host: www.unisoftindia.org:2078
Cache-Control: no-cache, no-store, must-revalidate, private
Connection: close
Vary: Accept-Encoding
WWW-Authenticate: Basic realm="Restricted Area"
Content-Length: ***replaced***
Content-Type: text/html; charset="utf-8"
Expires: ***replaced***

Solution:
Solution type: Workaround
Enable HSTS or add / congure the required directives correctly following the guides linked in
the references.
Note: Some web servers are not sending headers on specic status codes by default. Please review
your web server or application conguration to always send these headers on every response
independently from the status code.
- Apache: Use 'Header always set' instead of 'Header set'.
- nginx: Append the 'always' keyword to each 'add_header' directive.
For dierent applications or web severs please refer to the related documentation for a similar
conguration possibility.

Log Method
Details: SSL/TLS: HTTP Strict Transport Security (HSTS) Missing
OID:1.3.6.1.4.1.25623.1.0.105879
Version used: 2024-02-08T05:05:59Z

References
url: https://owasp.org/www-project-secure-headers/
url: https://owasp.org/www-project-cheat-sheets/cheatsheets/HTTP_Strict_Transpor
,→t_Security_Cheat_Sheet.html
url: https://owasp.org/www-project-secure-headers/#http-strict-transport-securit
,→y-hsts
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 103

. . . continued from previous page . . .


url: https://tools.ietf.org/html/rfc6797
url: https://securityheaders.io/
url: https://httpd.apache.org/docs/current/mod/mod_headers.html#header
url: https://nginx.org/en/docs/http/ngx_http_headers_module.html#add_header

Log (CVSS: 0.0)


NVT: Web Application Scanning Consolidation / Info Reporting

Summary
The script consolidates and reports various information for web application (formerly called
'CGI') scanning.
This information is based on the following scripts / settings:
- HTTP-Version Detection (OID: 1.3.6.1.4.1.25623.1.0.100034)
- No 404 check (OID: 1.3.6.1.4.1.25623.1.0.10386)
- Web mirroring / webmirror.nasl (OID: 1.3.6.1.4.1.25623.1.0.10662)
- Directory Scanner / DDI_Directory_Scanner.nasl (OID: 1.3.6.1.4.1.25623.1.0.11032)
- The congured 'cgi_path' within the 'Scanner Preferences' of the scan cong in use
- The congured 'Enable CGI scanning', 'Enable generic web application scanning' and 'Add
historic /scripts and /cgi-bin to directories for CGI scanning' within the 'Global variable settings'
of the scan cong in use
If you think any of this information is wrong please report it to the referenced community forum.

Quality of Detection: 80
Vulnerability Detection Result
The Hostname/IP "www.unisoftindia.org" was used to access the remote host.
Generic web application scanning is disabled for this host via the "Enable gener
,→ic web application scanning" option within the "Global variable settings" of t
,→he scan config in use.
Requests to this service are done via HTTP/1.1.
This service seems to be able to host PHP scripts.
This service seems to be able to host ASP scripts.
The User-Agent "Mozilla/5.0 [en] (X11, U; OpenVAS-VT 21.4.3)" was used to access
,→ the remote host.
Historic /scripts and /cgi-bin are not added to the directories used for web app
,→lication scanning. You can enable this again with the "Add historic /scripts a
,→nd /cgi-bin to directories for CGI scanning" option within the "Global variabl
,→e settings" of the scan config in use.
The following files/directories require authentication and are tested (if enable
,→d) by the script "HTTP Brute Force Logins with default Credentials (OID: 1.3.6
,→.1.4.1.25623.1.0.108041)":
https://www.unisoftindia.org:2078/
The following directories were used for web application scanning:
https://www.unisoftindia.org:2078/
While this is not, in and of itself, a bug, you should manually inspect these di
,→rectories to ensure that they are in compliance with company security standard
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 104

. . . continued from previous page . . .


,→s

Solution:

Log Method
Details: Web Application Scanning Consolidation / Info Reporting
OID:1.3.6.1.4.1.25623.1.0.111038
Version used: 2024-07-03T06:48:05Z

References
url: https://forum.greenbone.net/c/vulnerability-tests/7

[ return to 43.255.154.27 ]

2.1.23 Log 995/tcp

Log (CVSS: 0.0)


NVT: POP3 Server type and version

Summary
This detects the POP3 Server's type and version by connecting to the server and processing the
received banner.

Quality of Detection: 80
Vulnerability Detection Result
Remote POP3 server banner:
+OK Dovecot ready.
This is probably:
- Dovecot
The remote POP3 server is announcing the following available CAPABILITIES via an
,→ encrypted connection:
AUTH-RESP-CODE, CAPA, PIPELINING, RESP-CODES, SASL PLAIN LOGIN, TOP, UIDL, USER

Solution:

Log Method
Details: POP3 Server type and version
OID:1.3.6.1.4.1.25623.1.0.10185
Version used: 2023-08-01T13:29:10Z

Generated by HostedScan
2 RESULTS PER HOST 105

Log (CVSS: 0.0)


NVT: Services

Summary
This plugin performs service detection.

Quality of Detection: 80
Vulnerability Detection Result
A TLScustom server answered on this port

Solution:

Vulnerability Insight
This plugin attempts to guess which service is running on the remote port(s). For instance,
it searches for a web server which could listen on another port than 80 or 443 and makes this
information available for other check routines.

Log Method
Details: Services
OID:1.3.6.1.4.1.25623.1.0.10330
Version used: 2023-06-14T05:05:19Z

Log (CVSS: 0.0)


NVT: Services

Summary
This plugin performs service detection.

Quality of Detection: 80
Vulnerability Detection Result
A pop3 server is running on this port

Solution:

Vulnerability Insight
This plugin attempts to guess which service is running on the remote port(s). For instance,
it searches for a web server which could listen on another port than 80 or 443 and makes this
information available for other check routines.

Log Method
Details: Services
OID:1.3.6.1.4.1.25623.1.0.10330
Version used: 2023-06-14T05:05:19Z

Generated by HostedScan
2 RESULTS PER HOST 106

Log (CVSS: 0.0)


NVT: SSL/TLS: Collect and Report Certicate Details

Summary
This script collects and reports the details of all SSL/TLS certicates.
This data will be used by other tests to verify server certicates.

Quality of Detection: 98
Vulnerability Detection Result
The following certificate details of the remote service were collected.
Certificate details:
fingerprint (SHA-1) | B84E1827B136A8486244AEEE4F16AE2670E6DA49
fingerprint (SHA-256) | 28AB1C338D758F90F3B028FEE86033C303C5B11A3A0D19
,→598AA913C6D27DE14A
issued by | CN=Go Daddy Secure Certificate Authority - G2,
,→OU=http://certs.godaddy.com/repository/,O=GoDaddy.com\, Inc.,L=Scottsdale,ST=A
,→rizona,C=US
public key size (bits) | 2048
serial | 64BBBEECF3D5182D
signature algorithm | sha256WithRSAEncryption
subject | CN=unisoftindia.org
subject alternative names (SAN) | unisoftindia.org, www.unisoftindia.org
valid from | 2024-05-01 10:56:00 UTC
valid until | 2025-05-01 10:43:30 UTC

Solution:

Log Method
Details: SSL/TLS: Collect and Report Certificate Details
OID:1.3.6.1.4.1.25623.1.0.103692
Version used: 2024-06-14T05:05:48Z

Log (CVSS: 0.0)


NVT: SSL/TLS: Report Medium Cipher Suites

Summary
This routine reports all Medium SSL/TLS cipher suites accepted by a service.

Quality of Detection: 98
Vulnerability Detection Result
'Medium' cipher suites accepted by this service via the TLSv1.2 protocol:
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 107

. . . continued from previous page . . .


TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384

Solution:

Vulnerability Insight
Any cipher suite considered to be secure for only the next 10 years is considered as medium.

Log Method
Details: SSL/TLS: Report Medium Cipher Suites
OID:1.3.6.1.4.1.25623.1.0.902816
Version used: 2024-06-14T05:05:48Z

Log (CVSS: 0.0)


NVT: SSL/TLS: Report Non Weak Cipher Suites

Summary
This routine reports all Non Weak SSL/TLS cipher suites accepted by a service.

Quality of Detection: 98
Vulnerability Detection Result
'Non Weak' cipher suites accepted by this service via the TLSv1.2 protocol:
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256

Solution:

Log Method
Details: SSL/TLS: Report Non Weak Cipher Suites
OID:1.3.6.1.4.1.25623.1.0.103441
Version used: 2024-06-14T05:05:48Z

Log (CVSS: 0.0)


NVT: SSL/TLS: Report Perfect Forward Secrecy (PFS) Cipher Suites

Summary
This routine reports all SSL/TLS cipher suites accepted by a service which are supporting Perfect
Forward Secrecy (PFS).

Quality of Detection: 98
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 108

. . . continued from previous page . . .

Vulnerability Detection Result


Cipher suites supporting Perfect Forward Secrecy (PFS) are accepted by this serv
,→ice via the TLSv1.2 protocol:
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256

Solution:

Log Method
Details: SSL/TLS: Report Perfect Forward Secrecy (PFS) Cipher Suites
OID:1.3.6.1.4.1.25623.1.0.105018
Version used: 2024-06-14T05:05:48Z

Log (CVSS: 0.0)


NVT: SSL/TLS: Report Supported Cipher Suites

Summary
This routine reports all SSL/TLS cipher suites accepted by a service.

Quality of Detection: 98
Vulnerability Detection Result
'Strong' cipher suites accepted by this service via the TLSv1.2 protocol:
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
'Medium' cipher suites accepted by this service via the TLSv1.2 protocol:
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
No 'Weak' cipher suites accepted by this service via the TLSv1.2 protocol.
No 'Null' cipher suites accepted by this service via the TLSv1.2 protocol.
No 'Anonymous' cipher suites accepted by this service via the TLSv1.2 protocol.
No 'Strong' cipher suites accepted by this service via the TLSv1.3 protocol.
No 'Medium' cipher suites accepted by this service via the TLSv1.3 protocol.
No 'Weak' cipher suites accepted by this service via the TLSv1.3 protocol.
No 'Null' cipher suites accepted by this service via the TLSv1.3 protocol.
No 'Anonymous' cipher suites accepted by this service via the TLSv1.3 protocol.

Solution:

Vulnerability Insight
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 109

. . . continued from previous page . . .


Notes:
- As the VT 'SSL/TLS: Check Supported Cipher Suites' (OID: 1.3.6.1.4.1.25623.1.0.900234)
might run into a timeout the actual reporting of all accepted cipher suites takes place in this VT
instead.
- SSLv2 ciphers are not getting reported as the protocol itself is deprecated, needs to be considered
as weak and is reported separately as deprecated.

Log Method
Details: SSL/TLS: Report Supported Cipher Suites
OID:1.3.6.1.4.1.25623.1.0.802067
Version used: 2024-06-14T05:05:48Z

Log (CVSS: 0.0)


NVT: SSL/TLS: Version Detection

Summary
Enumeration and reporting of SSL/TLS protocol versions supported by a remote service.

Quality of Detection: 80
Vulnerability Detection Result
The remote SSL/TLS service supports the following SSL/TLS protocol version(s):
TLSv1.2
TLSv1.3

Solution:

Log Method
Sends multiple connection requests to the remote service and attempts to determine the SSL/TLS
protocol versions supported by the service from the replies.
Note: The supported SSL/TLS protocol versions included in the report of this VT are reported
independently from the allowed / supported SSL/TLS ciphers.
Details: SSL/TLS: Version Detection
OID:1.3.6.1.4.1.25623.1.0.105782
Version used: 2024-06-14T05:05:48Z

[ return to 43.255.154.27 ]

2.1.24 Log 587/tcp

Log (CVSS: 0.0)


NVT: Check if the SMTP server accepts us

Summary
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 110

. . . continued from previous page . . .


This script does not perform any security test.
It veries that the scanner is able to connect to the remote SMTP server and that it can send a
HELO request.

Quality of Detection: 70
Vulnerability Detection Result
The SMTP server on this port answered with a 421 code. This means that it is tem
,→porarily unavailable because it is overloaded or any other reason.
The scan will be incomplete. You should fix your MTA and rerun the scan, or disa
,→ble this server if you don't use it.

Solution:

Log Method
Details: Check if the SMTP server accepts us
OID:1.3.6.1.4.1.25623.1.0.18528
Version used: 2023-08-01T13:29:10Z

Log (CVSS: 0.0)


NVT: Services

Summary
This plugin performs service detection.

Quality of Detection: 80
Vulnerability Detection Result
An SMTP server is running on this port
Here is its banner :
220-sg2plzcpnl506017.prod.sin2.secureserver.net ESMTP Exim 4.96.2 #2 Tue, 09 Jul
,→ 2024 08:13:28 -0700

Solution:

Vulnerability Insight
This plugin attempts to guess which service is running on the remote port(s). For instance,
it searches for a web server which could listen on another port than 80 or 443 and makes this
information available for other check routines.

Log Method
Details: Services
OID:1.3.6.1.4.1.25623.1.0.10330
Version used: 2023-06-14T05:05:19Z

Generated by HostedScan
2 RESULTS PER HOST 111

Log (CVSS: 0.0)


NVT: SMTP Server type and version

Summary
This detects the SMTP Server's type and version by connecting to the server and processing the
buer received.

Quality of Detection: 80
Vulnerability Detection Result
Remote SMTP server banner:
421 Too many concurrent SMTP connections from this IP address; please try again
,→later.

Solution:

Log Method
Details: SMTP Server type and version
OID:1.3.6.1.4.1.25623.1.0.10263
Version used: 2024-06-25T05:05:27Z

Log (CVSS: 0.0)


NVT: SSL/TLS: Perfect Forward Secrecy Cipher Suites Missing

Summary
The remote service is missing support for SSL/TLS cipher suites supporting Perfect Forward
Secrecy.

Quality of Detection: 98
Vulnerability Detection Result
The remote service does not support perfect forward secrecy cipher suites.

Solution:

Log Method
Details: SSL/TLS: Perfect Forward Secrecy Cipher Suites Missing
OID:1.3.6.1.4.1.25623.1.0.105092
Version used: 2023-07-27T05:05:09Z

Log (CVSS: 0.0)


NVT: SSL/TLS: Report Supported Cipher Suites

Summary
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 112

. . . continued from previous page . . .


This routine reports all SSL/TLS cipher suites accepted by a service.

Quality of Detection: 98
Vulnerability Detection Result
No 'Strong' cipher suites accepted by this service via the TLSv1.3 protocol.
No 'Medium' cipher suites accepted by this service via the TLSv1.3 protocol.
No 'Weak' cipher suites accepted by this service via the TLSv1.3 protocol.
No 'Null' cipher suites accepted by this service via the TLSv1.3 protocol.
No 'Anonymous' cipher suites accepted by this service via the TLSv1.3 protocol.

Solution:

Vulnerability Insight
Notes:
- As the VT 'SSL/TLS: Check Supported Cipher Suites' (OID: 1.3.6.1.4.1.25623.1.0.900234)
might run into a timeout the actual reporting of all accepted cipher suites takes place in this VT
instead.
- SSLv2 ciphers are not getting reported as the protocol itself is deprecated, needs to be considered
as weak and is reported separately as deprecated.

Log Method
Details: SSL/TLS: Report Supported Cipher Suites
OID:1.3.6.1.4.1.25623.1.0.802067
Version used: 2024-06-14T05:05:48Z

Log (CVSS: 0.0)


NVT: SSL/TLS: SMTP 'STARTTLS' Command Detection

Summary
Checks if the remote SMTP server supports SSL/TLS with the 'STARTTLS' command.

Quality of Detection: 80
Vulnerability Detection Result
The remote SMTP server supports SSL/TLS with the 'STARTTLS' command.
The remote SMTP server is announcing the following available ESMTP commands (EHL
,→O response) after sending the 'STARTTLS' command:
8BITMIME, AUTH PLAIN LOGIN, HELP, PIPECONNECT, PIPELINING, SIZE 52428800

Solution:

Log Method
Details: SSL/TLS: SMTP 'STARTTLS' Command Detection
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 113

. . . continued from previous page . . .


OID:1.3.6.1.4.1.25623.1.0.103118
Version used: 2023-10-31T05:06:37Z

References
url: https://tools.ietf.org/html/rfc3207

Log (CVSS: 0.0)


NVT: SSL/TLS: Version Detection

Summary
Enumeration and reporting of SSL/TLS protocol versions supported by a remote service.

Quality of Detection: 80
Vulnerability Detection Result
The remote SSL/TLS service supports the following SSL/TLS protocol version(s):
TLSv1.3

Solution:

Log Method
Sends multiple connection requests to the remote service and attempts to determine the SSL/TLS
protocol versions supported by the service from the replies.
Note: The supported SSL/TLS protocol versions included in the report of this VT are reported
independently from the allowed / supported SSL/TLS ciphers.
Details: SSL/TLS: Version Detection
OID:1.3.6.1.4.1.25623.1.0.105782
Version used: 2024-06-14T05:05:48Z

[ return to 43.255.154.27 ]

2.1.25 Log 2082/tcp

Log (CVSS: 0.0)


NVT: Response Time / No 404 Error Code Check

Summary
This VT tests if the remote web server does not reply with a 404 error code and checks if it is
replying to the scanners requests in a reasonable amount of time.

Quality of Detection: 80
Vulnerability Detection Result
The remote web server is very slow - it took 80 seconds (Maximum response time c
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 114

. . . continued from previous page . . .


,→onfigured in 'Response Time / No 404 Error Code Check' (OID: 1.3.6.1.4.1.25623
,→.1.0.10386) preferences: 60 seconds) to execute the plugin no404.nasl (it usua
,→lly only takes a few seconds).
In order to keep the scan total time to a reasonable amount, the remote web serv
,→er has not been tested.
If the remote server should be tested it has to be fixed to have it reply to the
,→ scanners requests in a reasonable amount of time. Alternatively the 'Maximum
,→response time (in seconds)' preference could be raised to a higher value if lo
,→nger scan times are accepted.

Solution:

Vulnerability Insight
This web server might show the following issues:
- it is [mis]congured in that it does not return '404 Not Found' error codes when a non-existent
le is requested, perhaps returning a site map, search page, authentication page or redirect
instead.
The Scanner might enabled some counter measures for that, however they might be insucient.
If a great number of security issues are reported for this port, they might not all be accurate.
- it doesn't response in a reasonable amount of time to various HTTP requests sent by this VT.
In order to keep the scan total time to a reasonable amount, the remote web server might not be
tested. If the remote server should be tested it has to be xed to have it reply to the scanners
requests in a reasonable amount of time.
Alternatively the 'Maximum response time (in seconds)' preference could be raised to a higher
value if longer scan times are accepted.

Log Method
Details: Response Time / No 404 Error Code Check
OID:1.3.6.1.4.1.25623.1.0.10386
Version used: 2023-07-07T05:05:26Z

Log (CVSS: 0.0)


NVT: Response Time / No 404 Error Code Check

Summary
This VT tests if the remote web server does not reply with a 404 error code and checks if it is
replying to the scanners requests in a reasonable amount of time.

Quality of Detection: 80
Vulnerability Detection Result
The host returns a 30x (e.g. 301) error code when a non-existent file is request
,→ed. Some HTTP-related checks have been disabled.

Solution:
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 115

. . . continued from previous page . . .

Vulnerability Insight
This web server might show the following issues:
- it is [mis]congured in that it does not return '404 Not Found' error codes when a non-existent
le is requested, perhaps returning a site map, search page, authentication page or redirect
instead.
The Scanner might enabled some counter measures for that, however they might be insucient.
If a great number of security issues are reported for this port, they might not all be accurate.
- it doesn't response in a reasonable amount of time to various HTTP requests sent by this VT.
In order to keep the scan total time to a reasonable amount, the remote web server might not be
tested. If the remote server should be tested it has to be xed to have it reply to the scanners
requests in a reasonable amount of time.
Alternatively the 'Maximum response time (in seconds)' preference could be raised to a higher
value if longer scan times are accepted.

Log Method
Details: Response Time / No 404 Error Code Check
OID:1.3.6.1.4.1.25623.1.0.10386
Version used: 2023-07-07T05:05:26Z

Log (CVSS: 0.0)


NVT: Services

Summary
This plugin performs service detection.

Quality of Detection: 80
Vulnerability Detection Result
A web server is running on this port

Solution:

Vulnerability Insight
This plugin attempts to guess which service is running on the remote port(s). For instance,
it searches for a web server which could listen on another port than 80 or 443 and makes this
information available for other check routines.

Log Method
Details: Services
OID:1.3.6.1.4.1.25623.1.0.10330
Version used: 2023-06-14T05:05:19Z

Generated by HostedScan
2 RESULTS PER HOST 116

Log (CVSS: 0.0)


NVT: Web Application Scanning Consolidation / Info Reporting

Summary
The script consolidates and reports various information for web application (formerly called
'CGI') scanning.
This information is based on the following scripts / settings:
- HTTP-Version Detection (OID: 1.3.6.1.4.1.25623.1.0.100034)
- No 404 check (OID: 1.3.6.1.4.1.25623.1.0.10386)
- Web mirroring / webmirror.nasl (OID: 1.3.6.1.4.1.25623.1.0.10662)
- Directory Scanner / DDI_Directory_Scanner.nasl (OID: 1.3.6.1.4.1.25623.1.0.11032)
- The congured 'cgi_path' within the 'Scanner Preferences' of the scan cong in use
- The congured 'Enable CGI scanning', 'Enable generic web application scanning' and 'Add
historic /scripts and /cgi-bin to directories for CGI scanning' within the 'Global variable settings'
of the scan cong in use
If you think any of this information is wrong please report it to the referenced community forum.

Quality of Detection: 80
Vulnerability Detection Result
The Hostname/IP "www.unisoftindia.org" was used to access the remote host.
Generic web application scanning is disabled for this host via the "Enable gener
,→ic web application scanning" option within the "Global variable settings" of t
,→he scan config in use.
This service is marked as broken and no web application scanning is launched aga
,→inst it. Reason(s):
-----
- The remote web server is very slow - it took 80 seconds (Maximum response tim
,→e configured in 'Response Time / No 404 Error Code Check' (OID: 1.3.6.1.4.1.25
,→623.1.0.10386) preferences: 60 seconds) to execute the plugin no404.nasl (it u
,→sually only takes a few seconds).
In order to keep the scan total time to a reasonable amount, the remote web serv
,→er has not been tested.
If the remote server should be tested it has to be fixed to have it reply to the
,→ scanners requests in a reasonable amount of time. Alternatively the 'Maximum
,→response time (in seconds)' preference could be raised to a higher value if lo
,→nger scan times are accepted.
-----
Requests to this service are done via HTTP/1.1.
This service seems to be able to host PHP scripts.
This service seems to be able to host ASP scripts.
The User-Agent "Mozilla/5.0 [en] (X11, U; OpenVAS-VT 21.4.3)" was used to access
,→ the remote host.
Historic /scripts and /cgi-bin are not added to the directories used for web app
,→lication scanning. You can enable this again with the "Add historic /scripts a
,→nd /cgi-bin to directories for CGI scanning" option within the "Global variabl
,→e settings" of the scan config in use.
The following directories were used for web application scanning:
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 117

. . . continued from previous page . . .


http://www.unisoftindia.org:2082/
While this is not, in and of itself, a bug, you should manually inspect these di
,→rectories to ensure that they are in compliance with company security standard
,→s

Solution:

Log Method
Details: Web Application Scanning Consolidation / Info Reporting
OID:1.3.6.1.4.1.25623.1.0.111038
Version used: 2024-07-03T06:48:05Z

References
url: https://forum.greenbone.net/c/vulnerability-tests/7

[ return to 43.255.154.27 ]

2.1.26 Log 25/tcp

Log (CVSS: 0.0)


NVT: Check if the SMTP server accepts us

Summary
This script does not perform any security test.
It veries that the scanner is able to connect to the remote SMTP server and that it can send a
HELO request.

Quality of Detection: 70
Vulnerability Detection Result
The SMTP server on this port answered with a 421 code. This means that it is tem
,→porarily unavailable because it is overloaded or any other reason.
The scan will be incomplete. You should fix your MTA and rerun the scan, or disa
,→ble this server if you don't use it.

Solution:

Log Method
Details: Check if the SMTP server accepts us
OID:1.3.6.1.4.1.25623.1.0.18528
Version used: 2023-08-01T13:29:10Z

Generated by HostedScan
2 RESULTS PER HOST 118

Log (CVSS: 0.0)


NVT: Services

Summary
This plugin performs service detection.

Quality of Detection: 80
Vulnerability Detection Result
An SMTP server is running on this port
Here is its banner :
421 Too many concurrent SMTP connections from this IP address; please try again
,→later.

Solution:

Vulnerability Insight
This plugin attempts to guess which service is running on the remote port(s). For instance,
it searches for a web server which could listen on another port than 80 or 443 and makes this
information available for other check routines.

Log Method
Details: Services
OID:1.3.6.1.4.1.25623.1.0.10330
Version used: 2023-06-14T05:05:19Z

Log (CVSS: 0.0)


NVT: SMTP Server type and version

Summary
This detects the SMTP Server's type and version by connecting to the server and processing the
buer received.

Quality of Detection: 80
Vulnerability Detection Result
Remote SMTP server banner:
421 Too many concurrent SMTP connections from this IP address; please try again
,→later.

Solution:

Log Method
Details: SMTP Server type and version
OID:1.3.6.1.4.1.25623.1.0.10263
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 119

. . . continued from previous page . . .


Version used: 2024-06-25T05:05:27Z

[ return to 43.255.154.27 ]

2.1.27 Log 443/tcp

Log (CVSS: 0.0)


NVT: elFinder Detection (HTTP)

Summary
HTTP based detection of elFinder.

Quality of Detection: 80
Vulnerability Detection Result
Detected elFinder
Version: unknown
Location: /
CPE: cpe:/a:std42:elfinder

Solution:

Log Method
Details: elFinder Detection (HTTP)
OID:1.3.6.1.4.1.25623.1.0.113323
Version used: 2023-03-01T10:20:05Z

References
url: https://studio-42.github.io/elFinder/

Log (CVSS: 0.0)


NVT: HTTP Security Headers Detection

Summary
All known security headers are being checked on the remote web server.
On completion a report will hand back whether a specic security header has been implemented
(including its value and if it is deprecated) or is missing on the target.

Quality of Detection: 80
Vulnerability Detection Result
Header Name | Header Value
-----------------------------------------------------
Strict-Transport-Security | max-age=31536000; preload
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 120

. . . continued from previous page . . .


Missing Headers | More Information
--------------------------------------------------------------------------------
,→------------------------------------------------------------------------------
,→------------------------------------------------------------------------------
,→----------
Content-Security-Policy | https://owasp.org/www-project-secure-headers
,→/#content-security-policy
Cross-Origin-Embedder-Policy | https://scotthelme.co.uk/coop-and-coep/, Not
,→e: This is an upcoming header
Cross-Origin-Opener-Policy | https://scotthelme.co.uk/coop-and-coep/, Not
,→e: This is an upcoming header
Cross-Origin-Resource-Policy | https://scotthelme.co.uk/coop-and-coep/, Not
,→e: This is an upcoming header
Document-Policy | https://w3c.github.io/webappsec-feature-poli
,→cy/document-policy#document-policy-http-header
Expect-CT | https://owasp.org/www-project-secure-headers
,→/#expect-ct, Note: This is an upcoming header
Feature-Policy | https://owasp.org/www-project-secure-headers
,→/#feature-policy, Note: The Feature Policy header has been renamed to Permissi
,→ons Policy
Permissions-Policy | https://w3c.github.io/webappsec-feature-poli
,→cy/#permissions-policy-http-header-field
Public-Key-Pins | Please check the output of the VTs including
,→ 'SSL/TLS:' and 'HPKP' in their name for more information and configuration he
,→lp. Note: Most major browsers have dropped / deprecated support for this heade
,→r in 2020.
Referrer-Policy | https://owasp.org/www-project-secure-headers
,→/#referrer-policy
Sec-Fetch-Dest | https://developer.mozilla.org/en-US/docs/Web
,→/HTTP/Headers#fetch_metadata_request_headers, Note: This is a new header suppo
,→rted only in newer browsers like e.g. Firefox 90
Sec-Fetch-Mode | https://developer.mozilla.org/en-US/docs/Web
,→/HTTP/Headers#fetch_metadata_request_headers, Note: This is a new header suppo
,→rted only in newer browsers like e.g. Firefox 90
Sec-Fetch-Site | https://developer.mozilla.org/en-US/docs/Web
,→/HTTP/Headers#fetch_metadata_request_headers, Note: This is a new header suppo
,→rted only in newer browsers like e.g. Firefox 90
Sec-Fetch-User | https://developer.mozilla.org/en-US/docs/Web
,→/HTTP/Headers#fetch_metadata_request_headers, Note: This is a new header suppo
,→rted only in newer browsers like e.g. Firefox 90
X-Content-Type-Options | https://owasp.org/www-project-secure-headers
,→/#x-content-type-options
X-Frame-Options | https://owasp.org/www-project-secure-headers
,→/#x-frame-options
X-Permitted-Cross-Domain-Policies | https://owasp.org/www-project-secure-headers
,→/#x-permitted-cross-domain-policies
X-XSS-Protection | https://owasp.org/www-project-secure-headers
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 121

. . . continued from previous page . . .


,→/#x-xss-protection, Note: Most major browsers have dropped / deprecated suppor
,→t for this header in 2020.

Solution:

Log Method
Details: HTTP Security Headers Detection
OID:1.3.6.1.4.1.25623.1.0.112081
Version used: 2021-07-14T06:19:43Z

References
url: https://owasp.org/www-project-secure-headers/
url: https://owasp.org/www-project-secure-headers/#div-headers
url: https://securityheaders.com/

Log (CVSS: 0.0)


NVT: HTTP Server type and version

Summary
This script detects and reports the HTTP Server's banner which might provide the type and
version of it.

Quality of Detection: 80
Vulnerability Detection Result
The remote HTTP Server banner is:
Server: Apache

Solution:

Log Method
Details: HTTP Server type and version
OID:1.3.6.1.4.1.25623.1.0.10107
Version used: 2023-08-01T13:29:10Z

Log (CVSS: 0.0)


NVT: robot.txt / robots.txt exists on the Web Server (HTTP)

Summary
Web Servers can use a le called /robot(s).txt to ask search engines to ignore certain les and
directories. By nature this le can not be used to protect private les from public read access.

Quality of Detection: 80
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 122

. . . continued from previous page . . .

Vulnerability Detection Result


The file 'https://www.unisoftindia.org/robots.txt' contains the following:
User-agent: *
Disallow:
User-Agent: Googlebot
Allow: /
Sitemap: http://www.unisoftindia.org/sitemap.xml
Disallow: /admin/
Disallow: /fms-enquiry/
Disallow: /public/index.php/

Solution:
Solution type: Mitigation
Review the content of the /robot(s).txt le and consider removing the les from the server or
protect them in other ways in case you actually intended non-public availability.

Vulnerability Insight
Any serious web search engine will honor the /robot(s).txt le and not scan the les and direc-
tories listed there.
Any entries listed in this le are not even hidden anymore.

Log Method
Details: robot.txt / robots.txt exists on the Web Server (HTTP)
OID:1.3.6.1.4.1.25623.1.0.10302
Version used: 2024-02-26T14:36:40Z

References
url: https://www.robotstxt.org/
url: https://www.robotstxt.org/norobots-rfc.txt

Log (CVSS: 0.0)


NVT: Services

Summary
This plugin performs service detection.

Quality of Detection: 80
Vulnerability Detection Result
A web server is running on this port through SSL

Solution:

. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 123

. . . continued from previous page . . .


Vulnerability Insight
This plugin attempts to guess which service is running on the remote port(s). For instance,
it searches for a web server which could listen on another port than 80 or 443 and makes this
information available for other check routines.

Log Method
Details: Services
OID:1.3.6.1.4.1.25623.1.0.10330
Version used: 2023-06-14T05:05:19Z

Log (CVSS: 0.0)


NVT: Services

Summary
This plugin performs service detection.

Quality of Detection: 80
Vulnerability Detection Result
A TLScustom server answered on this port

Solution:

Vulnerability Insight
This plugin attempts to guess which service is running on the remote port(s). For instance,
it searches for a web server which could listen on another port than 80 or 443 and makes this
information available for other check routines.

Log Method
Details: Services
OID:1.3.6.1.4.1.25623.1.0.10330
Version used: 2023-06-14T05:05:19Z

Log (CVSS: 0.0)


NVT: SSL/TLS: Collect and Report Certicate Details

Summary
This script collects and reports the details of all SSL/TLS certicates.
This data will be used by other tests to verify server certicates.

Quality of Detection: 98
Vulnerability Detection Result
The following certificate details of the remote service were collected.
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 124

. . . continued from previous page . . .


Certificate details:
fingerprint (SHA-1) | B84E1827B136A8486244AEEE4F16AE2670E6DA49
fingerprint (SHA-256) | 28AB1C338D758F90F3B028FEE86033C303C5B11A3A0D19
,→598AA913C6D27DE14A
issued by | CN=Go Daddy Secure Certificate Authority - G2,
,→OU=http://certs.godaddy.com/repository/,O=GoDaddy.com\, Inc.,L=Scottsdale,ST=A
,→rizona,C=US
public key size (bits) | 2048
serial | 64BBBEECF3D5182D
signature algorithm | sha256WithRSAEncryption
subject | CN=unisoftindia.org
subject alternative names (SAN) | unisoftindia.org, www.unisoftindia.org
valid from | 2024-05-01 10:56:00 UTC
valid until | 2025-05-01 10:43:30 UTC

Solution:

Log Method
Details: SSL/TLS: Collect and Report Certificate Details
OID:1.3.6.1.4.1.25623.1.0.103692
Version used: 2024-06-14T05:05:48Z

Log (CVSS: 0.0)


NVT: SSL/TLS: HTTP Public Key Pinning (HPKP) Missing

Summary
The remote web server is not enforcing HTTP Public Key Pinning (HPKP).
Note: Most major browsers have dropped / deprecated support for this header in 2020.

Quality of Detection: 80
Vulnerability Detection Result
The remote web server is not enforcing HPKP.
HTTP-Banner:
HTTP/1.1 200 OK
Date: ***replaced***
Server: Apache
Cache-Control: no-cache
Set-Cookie: ***replaced***
Strict-Transport-Security: max-age=31536000; preload
Upgrade: h2,h2c
Connection: Upgrade, close
Cache-Control: max-age=2592000
Expires: ***replaced***
Vary: Accept-Encoding
Transfer-Encoding: chunked
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 125

. . . continued from previous page . . .


Content-Type: text/html; charset=UTF-8

Solution:
Solution type: Workaround
Enable HPKP or add / congure the required directives correctly following the guides linked in
the references.
Note: Some web servers are not sending headers on specic status codes by default. Please review
your web server or application conguration to always send these headers on every response
independently from the status code.
- Apache: Use 'Header always set' instead of 'Header set'.
- nginx: Append the 'always' keyword to each 'add_header' directive.
For dierent applications or web severs please refer to the related documentation for a similar
conguration possibility.

Log Method
Details: SSL/TLS: HTTP Public Key Pinning (HPKP) Missing
OID:1.3.6.1.4.1.25623.1.0.108247
Version used: 2024-02-08T05:05:59Z

References
url: https://owasp.org/www-project-secure-headers/
url: https://owasp.org/www-project-secure-headers/#public-key-pinning-extension-
,→for-http-hpkp
url: https://tools.ietf.org/html/rfc7469
url: https://securityheaders.io/
url: https://httpd.apache.org/docs/current/mod/mod_headers.html#header
url: https://nginx.org/en/docs/http/ngx_http_headers_module.html#add_header

Log (CVSS: 0.0)


NVT: SSL/TLS: HTTP Strict Transport Security (HSTS) Detection

Summary
Checks if the remote web server has HTTP Strict Transport Security (HSTS) enabled.

Quality of Detection: 80
Vulnerability Detection Result
The remote web server is sending the "HTTP Strict-Transport-Security" header.
HSTS-Header:
Strict-Transport-Security: max-age=31536000; preload

Solution:

Log Method
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 126

. . . continued from previous page . . .


Details: SSL/TLS: HTTP Strict Transport Security (HSTS) Detection
OID:1.3.6.1.4.1.25623.1.0.105876
Version used: 2024-02-08T05:05:59Z

References
url: https://owasp.org/www-project-secure-headers/
url: https://owasp.org/www-project-cheat-sheets/cheatsheets/HTTP_Strict_Transpor
,→t_Security_Cheat_Sheet.html
url: https://owasp.org/www-project-secure-headers/#http-strict-transport-securit
,→y-hsts
url: https://tools.ietf.org/html/rfc6797
url: https://securityheaders.io/

Log (CVSS: 0.0)


NVT: SSL/TLS: `includeSubDomains` Missing in HSTS Header

Summary
The remote web server is missing the 'includeSubDomains' attribute in the HTTP Strict Trans-
port Security (HSTS) header.

Quality of Detection: 80
Vulnerability Detection Result
The remote web server is missing the "includeSubDomains" attribute in the HSTS h
,→eader.
HSTS Header:
Strict-Transport-Security: max-age=31536000; preload

Solution:
Solution type: Workaround
Add the 'includeSubDomains' attribute to the HSTS header.

Log Method
Details: SSL/TLS: `includeSubDomains` Missing in HSTS Header
OID:1.3.6.1.4.1.25623.1.0.105877
Version used: 2024-02-08T05:05:59Z

References
url: https://owasp.org/www-project-secure-headers/
url: https://owasp.org/www-project-cheat-sheets/cheatsheets/HTTP_Strict_Transpor
,→t_Security_Cheat_Sheet.html
url: https://owasp.org/www-project-secure-headers/#http-strict-transport-securit
,→y-hsts
url: https://tools.ietf.org/html/rfc6797
url: https://securityheaders.io/

Generated by HostedScan
2 RESULTS PER HOST 127

Log (CVSS: 0.0)


NVT: SSL/TLS: NPN / ALPN Extension and Protocol Support Detection

Summary
This routine identies services supporting the following extensions to TLS:
- Application-Layer Protocol Negotiation (ALPN)
- Next Protocol Negotiation (NPN).
Based on the availability of this extensions the supported Network Protocols by this service are
gathered and reported.

Quality of Detection: 80
Vulnerability Detection Result
The remote service advertises support for the following Network Protocol(s) via
,→the ALPN extension:
SSL/TLS Protocol:Network Protocol
TLSv1.2:HTTP/1.1
TLSv1.2:HTTP/2

Solution:

Log Method
Details: SSL/TLS: NPN / ALPN Extension and Protocol Support Detection
OID:1.3.6.1.4.1.25623.1.0.108099
Version used: 2023-04-18T10:19:20Z

References
url: https://tools.ietf.org/html/rfc7301
url: https://tools.ietf.org/html/draft-agl-tls-nextprotoneg-04

Log (CVSS: 0.0)


NVT: SSL/TLS: Report Medium Cipher Suites

Summary
This routine reports all Medium SSL/TLS cipher suites accepted by a service.

Quality of Detection: 98
Vulnerability Detection Result
'Medium' cipher suites accepted by this service via the TLSv1.2 protocol:
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 128

. . . continued from previous page . . .


TLS_RSA_WITH_AES_128_GCM_SHA256
TLS_RSA_WITH_AES_256_GCM_SHA384

Solution:

Vulnerability Insight
Any cipher suite considered to be secure for only the next 10 years is considered as medium.

Log Method
Details: SSL/TLS: Report Medium Cipher Suites
OID:1.3.6.1.4.1.25623.1.0.902816
Version used: 2024-06-14T05:05:48Z

Log (CVSS: 0.0)


NVT: SSL/TLS: Report Non Weak Cipher Suites

Summary
This routine reports all Non Weak SSL/TLS cipher suites accepted by a service.

Quality of Detection: 98
Vulnerability Detection Result
'Non Weak' cipher suites accepted by this service via the TLSv1.2 protocol:
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
TLS_RSA_WITH_AES_128_GCM_SHA256
TLS_RSA_WITH_AES_256_GCM_SHA384

Solution:

Log Method
Details: SSL/TLS: Report Non Weak Cipher Suites
OID:1.3.6.1.4.1.25623.1.0.103441
Version used: 2024-06-14T05:05:48Z

Log (CVSS: 0.0)


NVT: SSL/TLS: Report Perfect Forward Secrecy (PFS) Cipher Suites

Summary
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 129

. . . continued from previous page . . .


This routine reports all SSL/TLS cipher suites accepted by a service which are supporting Perfect
Forward Secrecy (PFS).

Quality of Detection: 98
Vulnerability Detection Result
Cipher suites supporting Perfect Forward Secrecy (PFS) are accepted by this serv
,→ice via the TLSv1.2 protocol:
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384

Solution:

Log Method
Details: SSL/TLS: Report Perfect Forward Secrecy (PFS) Cipher Suites
OID:1.3.6.1.4.1.25623.1.0.105018
Version used: 2024-06-14T05:05:48Z

Log (CVSS: 0.0)


NVT: SSL/TLS: Report Supported Cipher Suites

Summary
This routine reports all SSL/TLS cipher suites accepted by a service.

Quality of Detection: 98
Vulnerability Detection Result
No 'Strong' cipher suites accepted by this service via the TLSv1.2 protocol.
'Medium' cipher suites accepted by this service via the TLSv1.2 protocol:
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
TLS_RSA_WITH_AES_128_GCM_SHA256
TLS_RSA_WITH_AES_256_GCM_SHA384
No 'Weak' cipher suites accepted by this service via the TLSv1.2 protocol.
No 'Null' cipher suites accepted by this service via the TLSv1.2 protocol.
No 'Anonymous' cipher suites accepted by this service via the TLSv1.2 protocol.

. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 130

. . . continued from previous page . . .


Solution:

Vulnerability Insight
Notes:
- As the VT 'SSL/TLS: Check Supported Cipher Suites' (OID: 1.3.6.1.4.1.25623.1.0.900234)
might run into a timeout the actual reporting of all accepted cipher suites takes place in this VT
instead.
- SSLv2 ciphers are not getting reported as the protocol itself is deprecated, needs to be considered
as weak and is reported separately as deprecated.

Log Method
Details: SSL/TLS: Report Supported Cipher Suites
OID:1.3.6.1.4.1.25623.1.0.802067
Version used: 2024-06-14T05:05:48Z

Log (CVSS: 0.0)


NVT: SSL/TLS: Version Detection

Summary
Enumeration and reporting of SSL/TLS protocol versions supported by a remote service.

Quality of Detection: 80
Vulnerability Detection Result
The remote SSL/TLS service supports the following SSL/TLS protocol version(s):
TLSv1.2

Solution:

Log Method
Sends multiple connection requests to the remote service and attempts to determine the SSL/TLS
protocol versions supported by the service from the replies.
Note: The supported SSL/TLS protocol versions included in the report of this VT are reported
independently from the allowed / supported SSL/TLS ciphers.
Details: SSL/TLS: Version Detection
OID:1.3.6.1.4.1.25623.1.0.105782
Version used: 2024-06-14T05:05:48Z

Log (CVSS: 0.0)


NVT: Web Application Scanning Consolidation / Info Reporting

Summary
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 131

. . . continued from previous page . . .


The script consolidates and reports various information for web application (formerly called
'CGI') scanning.
This information is based on the following scripts / settings:
- HTTP-Version Detection (OID: 1.3.6.1.4.1.25623.1.0.100034)
- No 404 check (OID: 1.3.6.1.4.1.25623.1.0.10386)
- Web mirroring / webmirror.nasl (OID: 1.3.6.1.4.1.25623.1.0.10662)
- Directory Scanner / DDI_Directory_Scanner.nasl (OID: 1.3.6.1.4.1.25623.1.0.11032)
- The congured 'cgi_path' within the 'Scanner Preferences' of the scan cong in use
- The congured 'Enable CGI scanning', 'Enable generic web application scanning' and 'Add
historic /scripts and /cgi-bin to directories for CGI scanning' within the 'Global variable settings'
of the scan cong in use
If you think any of this information is wrong please report it to the referenced community forum.

Quality of Detection: 80
Vulnerability Detection Result
The Hostname/IP "www.unisoftindia.org" was used to access the remote host.
Generic web application scanning is disabled for this host via the "Enable gener
,→ic web application scanning" option within the "Global variable settings" of t
,→he scan config in use.
Requests to this service are done via HTTP/1.1.
This service seems to be able to host PHP scripts.
This service seems to be able to host ASP scripts.
The User-Agent "Mozilla/5.0 [en] (X11, U; OpenVAS-VT 21.4.3)" was used to access
,→ the remote host.
Historic /scripts and /cgi-bin are not added to the directories used for web app
,→lication scanning. You can enable this again with the "Add historic /scripts a
,→nd /cgi-bin to directories for CGI scanning" option within the "Global variabl
,→e settings" of the scan config in use.
A possible recursion was detected during web application scanning:
The service is using a relative URL in one or more HTML references where e.g. /f
,→ile1.html contains <a href="subdir/file2.html"> and a subsequent request for s
,→ubdir/file2.html is linking to subdir/file2.html. This would resolves to subdi
,→r/subdir/file2.html causing a recursion. To work around this counter-measures
,→have been enabled but the service should be fixed as well to not use such prob
,→lematic links. Below an excerpt of URLs is shown to help identify those issues
,→.
Syntax : URL (HTML link)
https://www.unisoftindia.org/12c-sql-fundamentals-exam-code-1z0-061 (intent://se
,→nd/+919503005060#Intent;scheme=smsto;package=com.whatsapp;action=android.inten
,→t.action.SENDTO;end)
https://www.unisoftindia.org/12c-sql-fundamentals-exam-code-1z0-061 (javascript:
,→void((function()%7Bvar%20e=document.createElement(script);e.setAttribute(type,
,→text/javascript);e.setAttribute(charset,UTF-8);e.setAttribute(src,https://asse
,→ts.pinterest.com/js/pinmarklet.js?r=+Math.random()*99999999);document.body.app
,→endChild(e)%7D)());)
https://www.unisoftindia.org/12c-sql-fundamentals-exam-code-1z0-061 (public/favi
. . . continues on next page . . .

Generated by HostedScan
2 RESULTS PER HOST 132

. . . continued from previous page . . .


,→con.ico)
https://www.unisoftindia.org/12c-sql-fundamentals-exam-code-1z0-061 (public/web-
,→assets/images/apple-touch-icon-114x114.png)
https://www.unisoftindia.org/12c-sql-fundamentals-exam-code-1z0-061 (public/web-
,→assets/images/apple-touch-icon-120x120.png)
The following directories were used for web application scanning:
https://www.unisoftindia.org/
While this is not, in and of itself, a bug, you should manually inspect these di
,→rectories to ensure that they are in compliance with company security standard
,→s
The following directories were excluded from web application scanning because th
,→e "Regex pattern to exclude directories from CGI scanning" setting of the VT "
,→Global variable settings" (OID: 1.3.6.1.4.1.25623.1.0.12288) for this scan was
,→: "/(index\.php|image|img|css|js$|js/|javascript|style|theme|icon|jquery|graph
,→ic|grafik|picture|bilder|thumbnail|media/|skins?/)"
https://www.unisoftindia.org/public/vendor/bootstrap/js
https://www.unisoftindia.org/public/vendor/font-awesome/css
https://www.unisoftindia.org/public/vendor/jquery
https://www.unisoftindia.org/public/web-assets/css
https://www.unisoftindia.org/public/web-assets/images
https://www.unisoftindia.org/public/web-assets/js
https://www.unisoftindia.org/web-assets/images
The following CGIs were discovered:
Syntax : cginame (arguments [default value])
https://www.unisoftindia.org/save-enquiry (name [] city [2] course_id [] mobile
,→[] email [] )
https://www.unisoftindia.org/search-results (query [] )
The following cgi scripts were excluded from web application scanning because of
,→ the "Regex pattern to exclude cgi scripts" setting of the VT "Web mirroring"
,→(OID: 1.3.6.1.4.1.25623.1.0.10662) for this scan was: "\.(js|css)$"
Syntax : cginame (arguments [default value])
https://www.unisoftindia.org/public/web-assets/js/creative.js (ver [1499366536]
,→)
https://www.unisoftindia.org/public/web-assets/js/scripts.js (ver [1715433774] )

Solution:

Log Method
Details: Web Application Scanning Consolidation / Info Reporting
OID:1.3.6.1.4.1.25623.1.0.111038
Version used: 2024-07-03T06:48:05Z

References
url: https://forum.greenbone.net/c/vulnerability-tests/7

[ return to 43.255.154.27 ]

Generated by HostedScan
2 RESULTS PER HOST 133

This le was automatically generated.

Generated by HostedScan

You might also like