קוד HTML:
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "DTD/xhtml1-strict.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
<title>Nessus Scan Report</title>
<style type="text/css" media="all">
BODY {BACKGROUND-COLOR: #2a4d66; font-family: tahoma,helvetica,sans-serif; font-size: 13px}
A {TEXT-DECORATION: none}
A {COLOR: #333; FONT-FAMILY: tahoma,helvetica,sans-serif, font-size: 13px}
A:link {COLOR: #333; FONT-FAMILY: tahoma,helvetica,sans-serif; TEXT-DECORATION:underline;font-size:13px}
A:active {COLOR: #333; FONT-FAMILY: tahoma,helvetica,sans-serif; TEXT-DECORATION:underline;font-size:13px}
a:hover {color: #000; font-family: tahoma,helvetica,sans-serif; text-decoration:none;font-size:13px}
TD {COLOR: #333; FONT-FAMILY: tahoma,helvetica,sans-serif; FONT-SIZE:13px; word-wrap:break-word;}
TR {COLOR: #333; FONT-FAMILY: tahoma,helvetica,sans-serif; FONT-SIZE:13px}
.even {background-color: #FFF;}
.odd {background-color: #DCDCDC;}
.sev_low {color: #397AB2}
.sev_med {color: #FDBE00}
.sev_high {color: red}
.ip_sev_low {color:#397AB2;font-weight:bold;font-size:1.5em;padding:3px}
.ip_sev_med {color:#FDBE00;font-weight:bold;font-size:1.5em;padding:3px}
.ip_sev_high {color:red;font-weight:bold;font-size:1.5em;padding:3px}
.hostlist {color:#FFF;font-size:2em;font-weight:bold;padding:3px}
.backTo a {color:#FFF;font-family:tahoma,helvetica,sans-serif;text-decoration:underline}
.backTo a:link {color:#FFF;font-family:tahoma,helvetica,sans-serif;text-decoration:underline}
.backTo a:active {color:#FFF;font-family:tahoma,helvetica,sans-serif;text-decoration:underline}
.backTo a:hover {color:#DFDFDF;font-family:tahoma,helvetica,sans-serif;text-decoration:none}
.backToContainer {padding: 4px 0 4px 0}
.vuln_info {font-weight:bold;text-decoration:underline}
.scan_time {font-weight:bold;text-decoration:underline}
.host_info {font-weight:bold;text-decoration:underline}
.plugin_sev_low {background-color:#397AB2}
.plugin_sev_med {background-color:#FDBE00}
.plugin_sev_high {background-color:red}
.plugin_label {color:#FFF;font-weight:bold;padding:3px}
.port_header {background-color:#67889f}
.port_header_label {font-weight:bold;color:#FFF;padding: 3px}
.toggle {color: #FFF}
.divider {padding-top: 2px}
.info_text {padding-left: 8px;}
.default_header {background-color:#67889f}
.info_bg {background-color:#EEF2F3; }
.plugin_output {
width: 600px;
overflow: auto;
white-space: -moz-pre-wrap; /* Mozilla */
white-space: -hp-pre-wrap; /* HP printers */
white-space: -o-pre-wrap; /* Opera 7 */
white-space: -pre-wrap; /* Opera 4-6 */
white-space: pre-wrap; /* CSS 2.1 */
white-space: pre-line; /* CSS 3 (and 2.1 as well, actually) */
word-wrap: break-word; /* IE */
}
</style>
<script type="text/javascript">
function toggle(divId)
{
var divObj = document.getElementById(divId);
if (divObj) {
var displayType = divObj.style.display;
if (displayType == "" || displayType == "block") {
divObj.style.display = "none";
} else {
divObj.style.display = "block";
}
}
}
</script>
</head>
<body>
<a name="toc"></a><table width="70%" align="center" border="0" cellspacing="0" cellpadding="0">
<tr class="default_header"><td align="left" class="hostlist">List of hosts</td></tr>
<tr><td>
<table width="100%" border="0" cellspacing="0" cellpadding="2">
<tr class="even">
<td width="60%"><a href="#toc_46.4.31.4">46.4.31.4</a></td>
<td width="40%" align="right" class="sev_med">Medium Severity problem(s) found</td>
</tr>
</table>
</td></tr>
</table>
<a name="toc_46.4.31.4"></a><div class="backToContainer">
<table width="70%" align="center" border="0" cellspacing="0" cellpadding="0">
<tr><td class="backTo" align="right"><a href="#toc">[^] Back</a></td></tr>
</table>
</div>
<table width="70%" align="center" border="0" cellspacing="0" cellpadding="0">
<tr class="default_header"><td align="left" class="ip_sev_med">46.4.31.4</td></tr>
<tr class="info_bg"><td>
<table width="100%" border="0" cellspacing="0" cellpadding="2">
<tr><td>
<span class="scan_time">Scan Time</span><br><table width="60%" border="0" align="center">
<tr>
<td align="left">Start time : </td>
<td align="right">Mon Apr 18 12:11:37 2011</td>
</tr>
<tr>
<td align="left">End time : </td>
<td align="right">Mon Apr 18 12:21:48 2011</td>
</tr>
</table>
</td></tr>
<tr><td colspan="2"><hr></td></tr>
<tr><td>
<span class="vuln_info">Number of vulnerabilities</span><br><table width="60%" border="0" align="center">
<tr>
<td align="left">Open ports : </td>
<td align="right">0</td>
</tr>
<tr>
<td align="left" class="sev_high">High : </td>
<td align="right" class="sev_high">0</td>
</tr>
<tr>
<td align="left" class="sev_med">Medium : </td>
<td align="right" class="sev_med">12</td>
</tr>
<tr>
<td align="left" class="sev_low">Low : </td>
<td align="right" class="sev_low">0</td>
</tr>
</table>
</td></tr>
<tr><td colspan="2"><hr></td></tr>
<tr><td>
<span class="host_info">Remote host information</span><br><table width="60%" border="0" align="center">
<tr>
<td align="left">Operating System : </td>
<td align="right">Linux Kernel 2.6</td>
</tr>
<tr><td align="left">NetBIOS name : </td></tr>
<tr>
<td align="left">DNS name : </td>
<td align="right">static.4.31.4.46.clients.your-server.de</td>
</tr>
</table>
</td></tr>
</table>
</td></tr>
</table>
<div class="backToContainer">
<table width="70%" align="center" border="0" cellspacing="0" cellpadding="0">
<tr><td class="backTo" align="right"><a href="#toc_46.4.31.4">[^] Back to 46.4.31.4</a></td></tr>
</table>
</div>
<br><a name="46.4.31.4_pop3(110/pop3)"></a><table width="70%" align="center" border="0" cellspacing="0" cellpadding="2"><tr class="port_header" onclick='toggle("46.4.31.4_pop3_110")' onmouseover="this.style.cursor='pointer'" title="Collapse/Expand">
<td align="left" class="port_header_label">Port pop3 (110/tcp)</td>
<td align="right" class="toggle">[-/+]</td>
</tr></table>
<div id="46.4.31.4_pop3_110" class="divider">
<table width="70%" align="center" border="0" cellspacing="0" cellpadding="2">
<tr class="plugin_sev_med"><td align="left" class="plugin_label">SSL Certificate with Wrong Hostname</td></tr>
<tr class="info_bg"><td colspan="2" class="info_text">
<div class="plugin_output">
<br><b>Synopsis:</b><br>The SSL certificate for this service is for a different host.<br><br><b>Description:</b><br>The commonName (CN) of the SSL certificate presented on this port is
for a different machine.<br><br><b>Risk factor:</b><br>Medium<br><br><b>CVSS Base Score:</b>5.0<br>CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N<br><br><b>Solution:</b><br>Purchase or generate a proper certificate for this service.<br><br><b>Plugin output:</b><br>
The following hostnames were checked :
host5.al-ra3ed.com
<br><br><b>Plugin ID:</b><br><a href="http://www.nessus.org/plugins/index.php?view=single&id=45411">45411</a>
</div>
</td></tr>
</table>
<div class="divider">
</div>
<table width="70%" align="center" border="0" cellspacing="0" cellpadding="2">
<tr class="plugin_sev_med"><td align="left" class="plugin_label">SSL Certificate signed with an unknown Certificate Authority</td></tr>
<tr class="info_bg"><td colspan="2" class="info_text">
<div class="plugin_output">
<br><b>Synopsis:</b><br>The SSL certificate for this service is signed by an unknown
certificate authority.<br><br><b>Description:</b><br>The X.509 certificate of the remote host is not signed by a known
public certificate authority. If the remote host is a public host in
production, this nullifies the use of SSL as anyone could establish a
man in the middle attack against the remote host.<br><br><b>Risk factor:</b><br>Medium<br><br><b>CVSS Base Score:</b>6.4<br>CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N<br><br><b>Solution:</b><br>Purchase or generate a proper certificate for this service.<br><br><b>Plugin output:</b><br>*** ERROR: Unknown root CA in the chain:
Country: US
State/Province: Unknown
Locality: Unknown
Organization: Unknown
Organization Unit: Unknown
Common Name: host5.al-ra3ed.com
Email Address: ssl@host5.al-ra3ed.com
Certificate chain:
|-Country: US
|-State/Province: Unknown
|-Locality: Unknown
|-Organization: Unknown
|-Organization Unit: Unknown
|-Common Name: host5.al-ra3ed.com
|-Email Address: ssl@host5.al-ra3ed.com
|
<br><br><b>Plugin ID:</b><br><a href="http://www.nessus.org/plugins/index.php?view=single&id=51192">51192</a>
</div>
</td></tr>
</table>
</div>
<br><a name="46.4.31.4_imap(143/imap)"></a><table width="70%" align="center" border="0" cellspacing="0" cellpadding="2"><tr class="port_header" onclick='toggle("46.4.31.4_imap_143")' onmouseover="this.style.cursor='pointer'" title="Collapse/Expand">
<td align="left" class="port_header_label">Port imap (143/tcp)</td>
<td align="right" class="toggle">[-/+]</td>
</tr></table>
<div id="46.4.31.4_imap_143" class="divider">
<table width="70%" align="center" border="0" cellspacing="0" cellpadding="2">
<tr class="plugin_sev_med"><td align="left" class="plugin_label">SSL Certificate with Wrong Hostname</td></tr>
<tr class="info_bg"><td colspan="2" class="info_text">
<div class="plugin_output">
<br><b>Synopsis:</b><br>The SSL certificate for this service is for a different host.<br><br><b>Description:</b><br>The commonName (CN) of the SSL certificate presented on this port is
for a different machine.<br><br><b>Risk factor:</b><br>Medium<br><br><b>CVSS Base Score:</b>5.0<br>CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N<br><br><b>Solution:</b><br>Purchase or generate a proper certificate for this service.<br><br><b>Plugin output:</b><br>
The following hostnames were checked :
host5.al-ra3ed.com
<br><br><b>Plugin ID:</b><br><a href="http://www.nessus.org/plugins/index.php?view=single&id=45411">45411</a>
</div>
</td></tr>
</table>
<div class="divider">
</div>
<table width="70%" align="center" border="0" cellspacing="0" cellpadding="2">
<tr class="plugin_sev_med"><td align="left" class="plugin_label">SSL Certificate signed with an unknown Certificate Authority</td></tr>
<tr class="info_bg"><td colspan="2" class="info_text">
<div class="plugin_output">
<br><b>Synopsis:</b><br>The SSL certificate for this service is signed by an unknown
certificate authority.<br><br><b>Description:</b><br>The X.509 certificate of the remote host is not signed by a known
public certificate authority. If the remote host is a public host in
production, this nullifies the use of SSL as anyone could establish a
man in the middle attack against the remote host.<br><br><b>Risk factor:</b><br>Medium<br><br><b>CVSS Base Score:</b>6.4<br>CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N<br><br><b>Solution:</b><br>Purchase or generate a proper certificate for this service.<br><br><b>Plugin output:</b><br>*** ERROR: Unknown root CA in the chain:
Country: US
State/Province: Unknown
Locality: Unknown
Organization: Unknown
Organization Unit: Unknown
Common Name: host5.al-ra3ed.com
Email Address: ssl@host5.al-ra3ed.com
Certificate chain:
|-Country: US
|-State/Province: Unknown
|-Locality: Unknown
|-Organization: Unknown
|-Organization Unit: Unknown
|-Common Name: host5.al-ra3ed.com
|-Email Address: ssl@host5.al-ra3ed.com
|
<br><br><b>Plugin ID:</b><br><a href="http://www.nessus.org/plugins/index.php?view=single&id=51192">51192</a>
</div>
</td></tr>
</table>
</div>
<br><a name="46.4.31.4_www(443/www)"></a><table width="70%" align="center" border="0" cellspacing="0" cellpadding="2"><tr class="port_header" onclick='toggle("46.4.31.4_www_443")' onmouseover="this.style.cursor='pointer'" title="Collapse/Expand">
<td align="left" class="port_header_label">Port www (443/tcp)</td>
<td align="right" class="toggle">[-/+]</td>
</tr></table>
<div id="46.4.31.4_www_443" class="divider">
<table width="70%" align="center" border="0" cellspacing="0" cellpadding="2">
<tr class="plugin_sev_med"><td align="left" class="plugin_label">HTTP TRACE / TRACK Methods Allowed</td></tr>
<tr class="info_bg"><td colspan="2" class="info_text">
<div class="plugin_output">
<br><b>Synopsis:</b><br>Debugging functions are enabled on the remote web server.<br><br><b>Description:</b><br>The remote webserver supports the TRACE and/or TRACK methods. TRACE
and TRACK are HTTP methods that are used to debug web server
connections.<br><br><b>Risk factor:</b><br>Medium<br><br><b>CVSS Base Score:</b>4.3<br>CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N<br><br><b>See also:</b><br>http://www.cgisecurity.com/whitehat-mirror/WH-WhitePaper_XST_ebook.pdf<br><br><b>See also:</b><br>http://www.apacheweek.com/issues/03-01-24<br><br><b>See also:</b><br>http://www.kb.cert.org/vuls/id/288308<br><br><b>See also:</b><br>http://www.kb.cert.org/vuls/id/867593<br><br><b>See also:</b><br>http://sunsolve.sun.com/search/document.do?assetkey=1-66-200942-1<br><br><b>Solution:</b><br>Disable these methods. Refer to the plugin output for more information.<br><br><b>Plugin output:</b><br>
Nessus sent the following TRACE request :
------------------------------ snip ------------------------------
TRACE /Nessus872496032.html HTTP/1.1
Connection: Close
Host: static.4.31.4.46.clients.your-server.de
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8
------------------------------ snip ------------------------------
and received the following response from the remote server :
------------------------------ snip ------------------------------
HTTP/1.1 200 OK
Date: Mon, 18 Apr 2011 09:17:21 GMT
Server: Secuerd by Al-Ra3eD.CoM
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: message/http
TRACE /Nessus872496032.html HTTP/1.1
Connection: Keep-Alive
Host: static.4.31.4.46.clients.your-server.de
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8
------------------------------ snip ------------------------------
<br><br><b>Plugin ID:</b><br><a href="http://www.nessus.org/plugins/index.php?view=single&id=11213">11213</a><br><br><b>CVE: </b><br>CVE-2003-1567, CVE-2004-2320, CVE-2010-0386<br><br><b>BID: </b><br><a href="http://www.securityfocus.com/bid/9506">9506</a>, <a href="http://www.securityfocus.com/bid/9561">9561</a>, <a href="http://www.securityfocus.com/bid/11604">11604</a>, <a href="http://www.securityfocus.com/bid/33374">33374</a>, <a href="http://www.securityfocus.com/bid/37995">37995</a><br><br><b>Other references: </b><br>OSVDB:877, OSVDB:3726, OSVDB:5648, OSVDB:50485, CWE:16</div>
</td></tr>
</table>
</div>
<br><a name="46.4.31.4_smtp(465/smtp)"></a><table width="70%" align="center" border="0" cellspacing="0" cellpadding="2"><tr class="port_header" onclick='toggle("46.4.31.4_smtp_465")' onmouseover="this.style.cursor='pointer'" title="Collapse/Expand">
<td align="left" class="port_header_label">Port smtp (465/tcp)</td>
<td align="right" class="toggle">[-/+]</td>
</tr></table>
<div id="46.4.31.4_smtp_465" class="divider">
<table width="70%" align="center" border="0" cellspacing="0" cellpadding="2">
<tr class="plugin_sev_med"><td align="left" class="plugin_label">SSL Certificate with Wrong Hostname</td></tr>
<tr class="info_bg"><td colspan="2" class="info_text">
<div class="plugin_output">
<br><b>Synopsis:</b><br>The SSL certificate for this service is for a different host.<br><br><b>Description:</b><br>The commonName (CN) of the SSL certificate presented on this port is
for a different machine.<br><br><b>Risk factor:</b><br>Medium<br><br><b>CVSS Base Score:</b>5.0<br>CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N<br><br><b>Solution:</b><br>Purchase or generate a proper certificate for this service.<br><br><b>Plugin output:</b><br>
The following hostnames were checked :
host5.al-ra3ed.com
<br><br><b>Plugin ID:</b><br><a href="http://www.nessus.org/plugins/index.php?view=single&id=45411">45411</a>
</div>
</td></tr>
</table>
<div class="divider">
</div>
<table width="70%" align="center" border="0" cellspacing="0" cellpadding="2">
<tr class="plugin_sev_med"><td align="left" class="plugin_label">SSL Certificate signed with an unknown Certificate Authority</td></tr>
<tr class="info_bg"><td colspan="2" class="info_text">
<div class="plugin_output">
<br><b>Synopsis:</b><br>The SSL certificate for this service is signed by an unknown
certificate authority.<br><br><b>Description:</b><br>The X.509 certificate of the remote host is not signed by a known
public certificate authority. If the remote host is a public host in
production, this nullifies the use of SSL as anyone could establish a
man in the middle attack against the remote host.<br><br><b>Risk factor:</b><br>Medium<br><br><b>CVSS Base Score:</b>6.4<br>CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N<br><br><b>Solution:</b><br>Purchase or generate a proper certificate for this service.<br><br><b>Plugin output:</b><br>*** ERROR: Unknown root CA in the chain:
Country: US
State/Province: Unknown
Locality: Unknown
Organization: Unknown
Organization Unit: Unknown
Common Name: host5.al-ra3ed.com
Email Address: ssl@host5.al-ra3ed.com
Certificate chain:
|-Country: US
|-State/Province: Unknown
|-Locality: Unknown
|-Organization: Unknown
|-Organization Unit: Unknown
|-Common Name: host5.al-ra3ed.com
|-Email Address: ssl@host5.al-ra3ed.com
|
<br><br><b>Plugin ID:</b><br><a href="http://www.nessus.org/plugins/index.php?view=single&id=51192">51192</a>
</div>
</td></tr>
</table>
</div>
<br><a name="46.4.31.4_www(8080/www)"></a><table width="70%" align="center" border="0" cellspacing="0" cellpadding="2"><tr class="port_header" onclick='toggle("46.4.31.4_www_8080")' onmouseover="this.style.cursor='pointer'" title="Collapse/Expand">
<td align="left" class="port_header_label">Port www (8080/tcp)</td>
<td align="right" class="toggle">[-/+]</td>
</tr></table>
<div id="46.4.31.4_www_8080" class="divider">
<table width="70%" align="center" border="0" cellspacing="0" cellpadding="2">
<tr class="plugin_sev_med"><td align="left" class="plugin_label">HTTP TRACE / TRACK Methods Allowed</td></tr>
<tr class="info_bg"><td colspan="2" class="info_text">
<div class="plugin_output">
<br><b>Synopsis:</b><br>Debugging functions are enabled on the remote web server.<br><br><b>Description:</b><br>The remote webserver supports the TRACE and/or TRACK methods. TRACE
and TRACK are HTTP methods that are used to debug web server
connections.<br><br><b>Risk factor:</b><br>Medium<br><br><b>CVSS Base Score:</b>4.3<br>CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N<br><br><b>See also:</b><br>http://www.cgisecurity.com/whitehat-mirror/WH-WhitePaper_XST_ebook.pdf<br><br><b>See also:</b><br>http://www.apacheweek.com/issues/03-01-24<br><br><b>See also:</b><br>http://www.kb.cert.org/vuls/id/288308<br><br><b>See also:</b><br>http://www.kb.cert.org/vuls/id/867593<br><br><b>See also:</b><br>http://sunsolve.sun.com/search/document.do?assetkey=1-66-200942-1<br><br><b>Solution:</b><br>Disable these methods. Refer to the plugin output for more information.<br><br><b>Plugin output:</b><br>
Nessus sent the following TRACE request :
------------------------------ snip ------------------------------
TRACE /Nessus389965929.html HTTP/1.1
Connection: Close
Host: static.4.31.4.46.clients.your-server.de
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8
------------------------------ snip ------------------------------
and received the following response from the remote server :
------------------------------ snip ------------------------------
HTTP/1.1 200 OK
Date: Mon, 18 Apr 2011 09:17:21 GMT
Server: Secuerd by Al-Ra3eD.CoM
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: message/http
TRACE /Nessus389965929.html HTTP/1.1
Connection: Keep-Alive
Host: static.4.31.4.46.clients.your-server.de
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8
------------------------------ snip ------------------------------
<br><br><b>Plugin ID:</b><br><a href="http://www.nessus.org/plugins/index.php?view=single&id=11213">11213</a><br><br><b>CVE: </b><br>CVE-2003-1567, CVE-2004-2320, CVE-2010-0386<br><br><b>BID: </b><br><a href="http://www.securityfocus.com/bid/9506">9506</a>, <a href="http://www.securityfocus.com/bid/9561">9561</a>, <a href="http://www.securityfocus.com/bid/11604">11604</a>, <a href="http://www.securityfocus.com/bid/33374">33374</a>, <a href="http://www.securityfocus.com/bid/37995">37995</a><br><br><b>Other references: </b><br>OSVDB:877, OSVDB:3726, OSVDB:5648, OSVDB:50485, CWE:16</div>
</td></tr>
</table>
</div>
<br><a name="46.4.31.4_imap(993/imap)"></a><table width="70%" align="center" border="0" cellspacing="0" cellpadding="2"><tr class="port_header" onclick='toggle("46.4.31.4_imap_993")' onmouseover="this.style.cursor='pointer'" title="Collapse/Expand">
<td align="left" class="port_header_label">Port imap (993/tcp)</td>
<td align="right" class="toggle">[-/+]</td>
</tr></table>
<div id="46.4.31.4_imap_993" class="divider">
<table width="70%" align="center" border="0" cellspacing="0" cellpadding="2">
<tr class="plugin_sev_med"><td align="left" class="plugin_label">SSL Certificate with Wrong Hostname</td></tr>
<tr class="info_bg"><td colspan="2" class="info_text">
<div class="plugin_output">
<br><b>Synopsis:</b><br>The SSL certificate for this service is for a different host.<br><br><b>Description:</b><br>The commonName (CN) of the SSL certificate presented on this port is
for a different machine.<br><br><b>Risk factor:</b><br>Medium<br><br><b>CVSS Base Score:</b>5.0<br>CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N<br><br><b>Solution:</b><br>Purchase or generate a proper certificate for this service.<br><br><b>Plugin output:</b><br>
The following hostnames were checked :
host5.al-ra3ed.com
<br><br><b>Plugin ID:</b><br><a href="http://www.nessus.org/plugins/index.php?view=single&id=45411">45411</a>
</div>
</td></tr>
</table>
<div class="divider">
</div>
<table width="70%" align="center" border="0" cellspacing="0" cellpadding="2">
<tr class="plugin_sev_med"><td align="left" class="plugin_label">SSL Certificate signed with an unknown Certificate Authority</td></tr>
<tr class="info_bg"><td colspan="2" class="info_text">
<div class="plugin_output">
<br><b>Synopsis:</b><br>The SSL certificate for this service is signed by an unknown
certificate authority.<br><br><b>Description:</b><br>The X.509 certificate of the remote host is not signed by a known
public certificate authority. If the remote host is a public host in
production, this nullifies the use of SSL as anyone could establish a
man in the middle attack against the remote host.<br><br><b>Risk factor:</b><br>Medium<br><br><b>CVSS Base Score:</b>6.4<br>CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N<br><br><b>Solution:</b><br>Purchase or generate a proper certificate for this service.<br><br><b>Plugin output:</b><br>*** ERROR: Unknown root CA in the chain:
Country: US
State/Province: Unknown
Locality: Unknown
Organization: Unknown
Organization Unit: Unknown
Common Name: host5.al-ra3ed.com
Email Address: ssl@host5.al-ra3ed.com
Certificate chain:
|-Country: US
|-State/Province: Unknown
|-Locality: Unknown
|-Organization: Unknown
|-Organization Unit: Unknown
|-Common Name: host5.al-ra3ed.com
|-Email Address: ssl@host5.al-ra3ed.com
|
<br><br><b>Plugin ID:</b><br><a href="http://www.nessus.org/plugins/index.php?view=single&id=51192">51192</a>
</div>
</td></tr>
</table>
</div>
<br><a name="46.4.31.4_pop3(995/pop3)"></a><table width="70%" align="center" border="0" cellspacing="0" cellpadding="2"><tr class="port_header" onclick='toggle("46.4.31.4_pop3_995")' onmouseover="this.style.cursor='pointer'" title="Collapse/Expand">
<td align="left" class="port_header_label">Port pop3 (995/tcp)</td>
<td align="right" class="toggle">[-/+]</td>
</tr></table>
<div id="46.4.31.4_pop3_995" class="divider">
<table width="70%" align="center" border="0" cellspacing="0" cellpadding="2">
<tr class="plugin_sev_med"><td align="left" class="plugin_label">SSL Certificate with Wrong Hostname</td></tr>
<tr class="info_bg"><td colspan="2" class="info_text">
<div class="plugin_output">
<br><b>Synopsis:</b><br>The SSL certificate for this service is for a different host.<br><br><b>Description:</b><br>The commonName (CN) of the SSL certificate presented on this port is
for a different machine.<br><br><b>Risk factor:</b><br>Medium<br><br><b>CVSS Base Score:</b>5.0<br>CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N<br><br><b>Solution:</b><br>Purchase or generate a proper certificate for this service.<br><br><b>Plugin output:</b><br>
The following hostnames were checked :
host5.al-ra3ed.com
<br><br><b>Plugin ID:</b><br><a href="http://www.nessus.org/plugins/index.php?view=single&id=45411">45411</a>
</div>
</td></tr>
</table>
<div class="divider">
</div>
<table width="70%" align="center" border="0" cellspacing="0" cellpadding="2">
<tr class="plugin_sev_med"><td align="left" class="plugin_label">SSL Certificate signed with an unknown Certificate Authority</td></tr>
<tr class="info_bg"><td colspan="2" class="info_text">
<div class="plugin_output">
<br><b>Synopsis:</b><br>The SSL certificate for this service is signed by an unknown
certificate authority.<br><br><b>Description:</b><br>The X.509 certificate of the remote host is not signed by a known
public certificate authority. If the remote host is a public host in
production, this nullifies the use of SSL as anyone could establish a
man in the middle attack against the remote host.<br><br><b>Risk factor:</b><br>Medium<br><br><b>CVSS Base Score:</b>6.4<br>CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N<br><br><b>Solution:</b><br>Purchase or generate a proper certificate for this service.<br><br><b>Plugin output:</b><br>*** ERROR: Unknown root CA in the chain:
Country: US
State/Province: Unknown
Locality: Unknown
Organization: Unknown
Organization Unit: Unknown
Common Name: host5.al-ra3ed.com
Email Address: ssl@host5.al-ra3ed.com
Certificate chain:
|-Country: US
|-State/Province: Unknown
|-Locality: Unknown
|-Organization: Unknown
|-Organization Unit: Unknown
|-Common Name: host5.al-ra3ed.com
|-Email Address: ssl@host5.al-ra3ed.com
|
<br><br><b>Plugin ID:</b><br><a href="http://www.nessus.org/plugins/index.php?view=single&id=51192">51192</a>
</div>
</td></tr>
</table>
</div>
<div class="backToContainer">
<table width="70%" align="center" border="0" cellspacing="0" cellpadding="0">
<tr><td class="backTo" align="right"><a href="#toc_46.4.31.4">[^] Back to 46.4.31.4</a></td></tr>
</table>
</div>
</body>
</html>
תשמרו כקובץ html ותראו את כל הבאגים ובאיזה שיטה אפשר לחדור דרכם...בינתיים אני מנסה לבד...