[AWS] Nessus resports security hole in aws?
Pascal Obry
p.obry@wanadoo.fr
Wed, 15 Oct 2003 14:55:59 +0200
Preben,
> I was running the hello_world demo of aws on my machine while checking
> it with nessus. I got this feedback:
>
> . Vulnerability found on port unknown (8080/tcp) :
>
>
> It is possible to retrieve the password of the remote guestbook application
> by requesting the file 'passwd.txt' in files/
>
> Solution : Delete the guestbook CGI
> Risk factor : Low
> BID : 7167
???
> . Information found on port unknown (8080/tcp)
>
>
> A web server is running on this port
Ok.
> . Information found on port unknown (8080/tcp)
>
>
>
> This web server is [mis]configured in that it
> does not return '404 Not Found' error codes when
> a non-existent file is requested, perhaps returning
> a site map or search page or authentication page instead.
>
> Unfortunately, we were unable to find a way to recognize this page,
> so some CGI-related checks have been disabled.
>
> To work around this issue, please contact the Nessus team.
Of course since Hello World demo always returns the same page.
> . Information found on port unknown (8080/tcp)
>
>
> The remote web server type is :
>
> AWS (Ada Web Server) v1.3
>
> Solution : We recommend that you configure (if possible) your web
> server to return
> a bogus Server header in order to not leak information.
???
> I don't understand this. Is it just a false alert or not?
Indeed some feedbacks are just non-sense to me :)
Pascal.
--
--|------------------------------------------------------
--| Pascal Obry Team-Ada Member
--| 45, rue Gabriel Peri - 78114 Magny Les Hameaux FRANCE
--|------------------------------------------------------
--| http://perso.wanadoo.fr/pascal.obry
--| "The best way to travel is by means of imagination"
--|
--| gpg --keyserver wwwkeys.pgp.net --recv-key C1082595