Project

General

Profile

Bug #3482

Updated by 邹 迎春 14 days ago

【操作路径】:
步骤1:使用扫描工具连接单板的LAN侧进行安全扫描;
步骤2:设定认证账号为useradmin,进入到普通用户配置界面,测试是否有漏洞;
步骤3:设定认证账号为telecomadmin,进入到管理界面,测试是否有漏洞;
步骤4:分析扫描结果,对告警的各类问题进行分析。
【实际结果】:
8080页面扫描有909、10932漏洞,详请查阅附件 8080页面扫描有4721、10932漏洞,详请查阅附件
【预期结果】
扫描结果中,Critical、High、Medium、Low中的如下内容不被视作网关安全问题(Info 和BP非问题):
中间件页面端口(80):
Internal IP Disclosure(3508)
Cross-Site Scripting ( 5649 )
Logins Sent Over Unencrypted Connection ( 4722 )
Unencrypted Login Form ( 10595 )
Possible Server Path Disclosure (unix) ( 810 )
CGI and Scripting-Related Directories ( 10212 )
Admin Section Must Require Authentication (4721)
Missing Content-Type Header (11308)
Browser Mime Sniffing is not disabled (11309)
Cross-Frame Scripting ( 11293 )
Critical和High:Session Fixation ( 11201 )
Password in Query or Cookie Data ( 10167 )
"Admin" Directory (10810)
Server Error Response ( 10932 )
Password Field Auto Complete Active (11276)
JSON Hijacking Possible (10731)
网关页面端口(8080):
Internal IP Disclosure(3508)
Critical和High:Session Fixation ( 11201 )
Password in Query or Cookie Data ( 10167 )
Cross-Frame Scripting ( 11293 )
Medium和Low:User Data in Query or Cookie ( 10965 )
CGI and Scripting-Related Directories ( 10212 )
Common Web Site Structure Directories ( 10214 )

Back