PCI Failed Results, please help!
Posted: Tue Jul 30, 2013 6:42 am
Hi all,
I did a PCI scan and these are my results:
1. Vulnerabilities in Custom Web Code (High)back
Port: http (80/tcp)
Summary:
We discovered vulnerabilities in the scripts listed below. Next to each script, there is a description of the type of attack that is possible, and the way to recreate the attack. If the attack is a simple HTTP GET request, you can usually paste it into your browser to see how it works. If it's a POST attack, the parameters for the POST request will be listed in square parenthesis.
Source Disclosure
URL: http://mywebsite.com/index.php?route=module/currency
Affected Parameter: route
Vector Used: ..THIS
Pattern found: </b> on line <b>\d+</b><br />
2. Vulnerabilities in Custom Web Code (High)back
Port: http (80/tcp)
Summary:
We discovered vulnerabilities in the scripts listed below. Next to each script, there is a description of the type of attack that is possible, and the way to recreate the attack. If the attack is a simple HTTP GET request, you can usually paste it into your browser to see how it works. If it's a POST attack, the parameters for the POST request will be listed in square parenthesis.
Source Disclosure
URL: http://mywebsite.com/index.php?route=module/currency
Affected Parameter: currency_code
Vector Used: %2E%2E/%2E%2E/%2E%2E/%2E%2ETHIS
Pattern found: </b> on line <b>\d+</b><br />
3. Vulnerabilities in Custom Web Code (High)back
Port: http (80/tcp)
Summary:
We discovered vulnerabilities in the scripts listed below. Next to each script, there is a description of the type of attack that is possible, and the way to recreate the attack. If the attack is a simple HTTP GET request, you can usually paste it into your browser to see how it works. If it's a POST attack, the parameters for the POST request will be listed in square parenthesis.
Source Disclosure
URL: http://mywebsite.com/index.php?route=module/currency
Affected Parameter: redirect
Vector Used: %2E%2ETHIS
Pattern found: </b> on line <b>\d+</b><br />
4. Vulnerabilities in Custom Web Code (High)back
Port: http (80/tcp)
Summary:
We discovered vulnerabilities in the scripts listed below. Next to each script, there is a description of the type of attack that is possible, and the way to recreate the attack. If the attack is a simple HTTP GET request, you can usually paste it into your browser to see how it works. If it's a POST attack, the parameters for the POST request will be listed in square parenthesis.
Source Disclosure
URL: http://mywebsite.com/index.php?route=module/currency
Affected Parameter: index.php
Vector Used: THIS
Pattern found: </b> on line <b>\d+</b><br />
5. Vulnerabilities in Custom Web Code (High)back
Port: http (80/tcp)
Summary:
We discovered vulnerabilities in the scripts listed below. Next to each script, there is a description of the type of attack that is possible, and the way to recreate the attack. If the attack is a simple HTTP GET request, you can usually paste it into your browser to see how it works. If it's a POST attack, the parameters for the POST request will be listed in square parenthesis.
Source Disclosure
URL: http://mywebsite.com/index.php?route=pr ... &path=5057
Affected Parameter: route
Vector Used: %2E%2ETHIS
Pattern found: </b> on line <b>\d+</b><br />
6. Vulnerabilities in Custom Web Code (High)back
Port: http (80/tcp)
Summary:
We discovered vulnerabilities in the scripts listed below. Next to each script, there is a description of the type of attack that is possible, and the way to recreate the attack. If the attack is a simple HTTP GET request, you can usually paste it into your browser to see how it works. If it's a POST attack, the parameters for the POST request will be listed in square parenthesis.
Source Disclosure
URL: http://mywebsite.com/index.php?route=pr ... &path=5057
Affected Parameter: path
Vector Used: %2E%2E/%2E%2E/%2E%2ETHIS
Pattern found: </b> on line <b>\d+</b><br />
7. Vulnerabilities in Custom Web Code (High)back
Port: http (80/tcp)
Summary:
We discovered vulnerabilities in the scripts listed below. Next to each script, there is a description of the type of attack that is possible, and the way to recreate the attack. If the attack is a simple HTTP GET request, you can usually paste it into your browser to see how it works. If it's a POST attack, the parameters for the POST request will be listed in square parenthesis.
Source Disclosure
URL: http://mywebsite.com/index.php?route=common/home
Affected Parameter: route
Vector Used: ../../../..THIS%00.txt
Pattern found: </b> on line <b>\d+</b><br />
Does anyone know how I can fix these?
Thanks!
I did a PCI scan and these are my results:
1. Vulnerabilities in Custom Web Code (High)back
Port: http (80/tcp)
Summary:
We discovered vulnerabilities in the scripts listed below. Next to each script, there is a description of the type of attack that is possible, and the way to recreate the attack. If the attack is a simple HTTP GET request, you can usually paste it into your browser to see how it works. If it's a POST attack, the parameters for the POST request will be listed in square parenthesis.
Source Disclosure
URL: http://mywebsite.com/index.php?route=module/currency
Affected Parameter: route
Vector Used: ..THIS
Pattern found: </b> on line <b>\d+</b><br />
2. Vulnerabilities in Custom Web Code (High)back
Port: http (80/tcp)
Summary:
We discovered vulnerabilities in the scripts listed below. Next to each script, there is a description of the type of attack that is possible, and the way to recreate the attack. If the attack is a simple HTTP GET request, you can usually paste it into your browser to see how it works. If it's a POST attack, the parameters for the POST request will be listed in square parenthesis.
Source Disclosure
URL: http://mywebsite.com/index.php?route=module/currency
Affected Parameter: currency_code
Vector Used: %2E%2E/%2E%2E/%2E%2E/%2E%2ETHIS
Pattern found: </b> on line <b>\d+</b><br />
3. Vulnerabilities in Custom Web Code (High)back
Port: http (80/tcp)
Summary:
We discovered vulnerabilities in the scripts listed below. Next to each script, there is a description of the type of attack that is possible, and the way to recreate the attack. If the attack is a simple HTTP GET request, you can usually paste it into your browser to see how it works. If it's a POST attack, the parameters for the POST request will be listed in square parenthesis.
Source Disclosure
URL: http://mywebsite.com/index.php?route=module/currency
Affected Parameter: redirect
Vector Used: %2E%2ETHIS
Pattern found: </b> on line <b>\d+</b><br />
4. Vulnerabilities in Custom Web Code (High)back
Port: http (80/tcp)
Summary:
We discovered vulnerabilities in the scripts listed below. Next to each script, there is a description of the type of attack that is possible, and the way to recreate the attack. If the attack is a simple HTTP GET request, you can usually paste it into your browser to see how it works. If it's a POST attack, the parameters for the POST request will be listed in square parenthesis.
Source Disclosure
URL: http://mywebsite.com/index.php?route=module/currency
Affected Parameter: index.php
Vector Used: THIS
Pattern found: </b> on line <b>\d+</b><br />
5. Vulnerabilities in Custom Web Code (High)back
Port: http (80/tcp)
Summary:
We discovered vulnerabilities in the scripts listed below. Next to each script, there is a description of the type of attack that is possible, and the way to recreate the attack. If the attack is a simple HTTP GET request, you can usually paste it into your browser to see how it works. If it's a POST attack, the parameters for the POST request will be listed in square parenthesis.
Source Disclosure
URL: http://mywebsite.com/index.php?route=pr ... &path=5057
Affected Parameter: route
Vector Used: %2E%2ETHIS
Pattern found: </b> on line <b>\d+</b><br />
6. Vulnerabilities in Custom Web Code (High)back
Port: http (80/tcp)
Summary:
We discovered vulnerabilities in the scripts listed below. Next to each script, there is a description of the type of attack that is possible, and the way to recreate the attack. If the attack is a simple HTTP GET request, you can usually paste it into your browser to see how it works. If it's a POST attack, the parameters for the POST request will be listed in square parenthesis.
Source Disclosure
URL: http://mywebsite.com/index.php?route=pr ... &path=5057
Affected Parameter: path
Vector Used: %2E%2E/%2E%2E/%2E%2ETHIS
Pattern found: </b> on line <b>\d+</b><br />
7. Vulnerabilities in Custom Web Code (High)back
Port: http (80/tcp)
Summary:
We discovered vulnerabilities in the scripts listed below. Next to each script, there is a description of the type of attack that is possible, and the way to recreate the attack. If the attack is a simple HTTP GET request, you can usually paste it into your browser to see how it works. If it's a POST attack, the parameters for the POST request will be listed in square parenthesis.
Source Disclosure
URL: http://mywebsite.com/index.php?route=common/home
Affected Parameter: route
Vector Used: ../../../..THIS%00.txt
Pattern found: </b> on line <b>\d+</b><br />
Does anyone know how I can fix these?
Thanks!