Un amigo le ha pasado una herramienta para sacarle brechas de seguridad y me ha enviado el informe. El problema es que yo no soy ningun experto en seguridad y no se si algun punto de este informe es especialmente critico, pues el sitio web va a tener mucho movimiento y por el tema que trata es muy delicado.
Agradezco cualquier ayuda sobre este informe (he sustituido mi dominio real por dominio.com)
Código:
--------------------------------------------------------------------------- - Nikto 1.32/1.19 - www.cirt.net + Target IP: xx.xx.xx.xx + Target Hostname: www.dominio.com + Target Port: 80 + Start Time: Tue Feb 8 12:10:28 2005 --------------------------------------------------------------------------- - Scan is dependent on "Server" string which can be faked, use -g to override + Server: Apache-Coyote/1.1 + The root file (/) redirects to: http://www.dominio.com/index.jsp + No CGI Directories found (use '-C all' to force check all possible dirs) + Allowed HTTP Methods: GET, HEAD, POST, PUT, DELETE, TRACE, OPTIONS + HTTP method 'PUT' method may allow clients to save files on the web server. + HTTP method 'DELETE' may allow clients to remove files on the web server. + HTTP method 'TRACE' is typically only used for debugging. It should be disabled. + / - Redirects to http://www.dominio.com/index.jsp , Appears to be a default Apache install. + // - Redirects to http://www.dominio.com/index.jsp , Apache on Red Hat Linux release 9 reveals the root directory listing by default if there is no index page. + /?D=A - Redirects to http://www.dominio.com/index.jsp?D=A , Apache allows directory listings by requesting. Upgrade Apache or disable directory indexing. + /?M=A - Redirects to http://www.dominio.com/index.jsp?M=A , Apache allows directory listings by requesting. Upgrade Apache or disable directory indexing. + /?N=D - Redirects to http://www.dominio.com/index.jsp?N=D , Apache allows directory listings by requesting. Upgrade Apache or disable directory indexing. + /?S=A - Redirects to http://www.dominio.com/index.jsp?S=A , Apache allows directory listings by requesting. Upgrade Apache or disable directory indexing. + /examples/ - Directory indexing enabled, also default JSP examples. (GET) + /examples/jsp/snp/snoop.jsp - Displays information about page retrievals, including other users. (GET) + /examples/servlets/index.html - Apache Tomcat default JSP pages present. (GET) + /tomcat-docs/index.html - Default Apache Tomcat documentation found. (GET) + / - Redirects to http://www.dominio.com/index.jsp , PeopleSoft appears to be running. + / - Redirects to http://www.dominio.com/index.jsp , Samba-swat web server. Used to administer Samba. + / - TRACE option appears to allow XSS or credential theft. See http://www.cgisecurity.com/whitehat-mirror/WhitePaper_screen.pdf for details (TRACE) + /./ - Redirects to http://www.dominio.com/index.jsp , Appending '/./' to a directory may reveal php source code. + /?mod=<script>alert(document.cookie)</script>&op=browse - Redirects to http://www.dominio.com/index.jsp?mod=<script>alert(document.cookie)</script>&op=browse , Sage 1.0b3 is vulnerable to Cross Site Scripting (XSS). CA-2000-02. + /?mod=node&nid=some_thing&op=view - Redirects to http://www.dominio.com/index.jsp?mod=node&nid=some_thing&op=view , Sage 1.0b3 may reveal system paths with invalid module names. + /?mod=some_thing&op=browse - Redirects to http://www.dominio.com/index.jsp?mod=some_thing&op=browse , Sage 1.0b3 reveals system paths with invalid module names. + /?pattern=/etc/*&sort=name - Redirects to http://www.dominio.com/index.jsp?pattern=/etc/*&sort=name , The TCLHttpd 3.4.2 server allows directory listings via dirlist.tcl. + /?sql_debug=1 - Redirects to http://www.dominio.com/index.jsp?sql_debug=1 , The PHP-Nuke install may allow attackers to enable debug mode and disclose sensitive information by adding sql_debug=1 to the query string. + /admin/contextAdmin/contextAdmin.html - Redirects to http://www.dominio.com/admin/login.jsp;jsessionid=819C87FD17D88DF86C389D4D02B9AC50 , Tomcat may be configured to let attackers read arbitrary files. Restrict access to /admin. + /manager/ - May be a web server or site manager. (GET) + /admin/ - Redirects to http://www.dominio.com/admin/index.jsp , This might be interesting... + 1335 items checked - 6 item(s) found on remote host(s) + End Time: Tue Feb 8 12:33:49 2005 (1401 seconds) --------------------------------------------------------------------------- + 1 host(s) tested
Por cierto, en el raiz de tomcat, el index.jsp redirige a mi aplicacion web: webApp, pues no se como configurar el tomcat (sin apache) para que al cargar el dominio, me carge la aplicacion web 'webApp' (que esta como subdirectorio de webapps del tomcat) y no la pagina por defecto del tomcat. ¿Alguien sabe hacerlo?
Gracias y un saludo.-