Is-03 q1 Pci Asv DNS-ip-was Reports - DB
Is-03 q1 Pci Asv DNS-ip-was Reports - DB
Is-03 q1 Pci Asv DNS-ip-was Reports - DB
64.178.217. 50600 CVE-2010-38 5 Medium TCP 443 Apache Shiro URI Path Security
64.178.217. 56818 6.4 Medium TCP 443 CGI Generic Cross-Site Request
64.178.217. 119811 7.8 High TCP 443 Script Src Integrity Check
64.178.217. 159543 4 Medium TCP 443 SSL/TLS Recommended Cipher S
64.178.217. 50600 CVE-2010-38 5 Medium TCP 443 Apache Shiro URI Path Security
64.178.217. 56818 6.4 Medium TCP 443 CGI Generic Cross-Site Request
64.178.217. 50600 CVE-2010-38 5 Medium TCP 443 Apache Shiro URI Path Security
64.178.217. 64588 CVE-2007-28 7.5 High TCP 443 Microsoft ASP.NET MS-DOS De
64.178.217. 159543 4 Medium TCP 443 SSL/TLS Recommended Cipher S
64.178.217. 56818 6.4 Medium TCP 443 CGI Generic Cross-Site Request
64.178.217. 88099 5 Medium TCP 443 Web Server HTTP Header Infor
64.178.217. 159543 4 Medium TCP 443 SSL/TLS Recommended Cipher S
Synopsis
The remote h
The remote h
The remote h
A security f
The remote w
Report extern
The remote h
The remote h
A security f
The remote w
The remote h
The remote h
A security f
A framework
The remote h
The remote h
The remote w
The remote h
The remote h
The SSL certif
The remote w
The remote w
The remote h
Description
The remote host is vulnerable to one or more conditions that are considered to be 'automatic failures' according to the PCI DSS Approved
- Internet reachable database servers (must validate whether cardholder data is stored)
- Use of older, insecure SSL/TLS versions (TLS v1.2 is the minimum standard)
- Scan Interference
Details of the failed items may be found in the 'Output' section of this plugin result. These vulnerabilities and/or failure conditions will hav
If you are conducting this scan via Tenable.io and either disagree with any of the results, believe there are false-positives, or must rely on c
in Tenable.io and dispute or provide mitigation evidence for each of the residual findings.
The remote host has open SSL/TLS ports which advertise discouraged cipher suites. It is recommended to only enable support for the follo
TLSv1.3:
- 0x13,0x01 TLS_AES_128_GCM_SHA256
- 0x13,0x02 TLS_AES_256_GCM_SHA384
- 0x13,0x03 TLS_CHACHA20_POLY1305_SHA256
TLSv1.2:
- 0xC0,0x2B ECDHE-ECDSA-AES128-GCM-SHA256
- 0xC0,0x2F ECDHE-RSA-AES128-GCM-SHA256
- 0xC0,0x2C ECDHE-ECDSA-AES256-GCM-SHA384
- 0xC0,0x30 ECDHE-RSA-AES256-GCM-SHA384
- 0xCC,0xA9 ECDHE-ECDSA-CHACHA20-POLY1305
- 0xCC,0xA8 ECDHE-RSA-CHACHA20-POLY1305
- 0x00,0x9E DHE-RSA-AES128-GCM-SHA256
- 0x00,0x9F DHE-RSA-AES256-GCM-SHA384
This is the recommended configuration for the vast majority of services, as it is highly secure and compatible with nearly every client relea
The remote host is vulnerable to one or more conditions that are considered to be 'automatic failures' according to the PCI DSS Approved
- Vulnerabilities with a CVSS base score greater than or equal to 4.0
- Use of older, insecure SSL/TLS versions (TLS v1.2 is the minimum standard)
- Scan Interference
Details of the failed items may be found in the 'Output' section of this plugin result. These vulnerabilities and/or failure conditions will hav
If you are conducting this scan via Tenable.io and either disagree with any of the results, believe there are false-positives, or must rely on c
in Tenable.io and dispute or provide mitigation evidence for each of the residual findings.
The version of the Apache Shiro open source security framework running on the remote web server is affected by an error in the path-bas
using directory traversal, to bypass intended access restrictions, resulting in the disclosure of sensitive information.
Nessus has found HTML forms on the remote web server. Some CGI scripts do not appear to be protected by random tokens, a common a
You will need to audit the source of the CGI scripts and check if they are actually affected.
The remote host may be vulnerable to payment entry data exfiltration due to javascript included from potentially untrusted and unverified
If the host is controlled by a 3rd party, ensure that the 3rd party is PCI DSS compliant.
The remote host has open SSL/TLS ports which advertise discouraged cipher suites. It is recommended to only enable support for the follo
TLSv1.3:
- 0x13,0x01 TLS_AES_128_GCM_SHA256
- 0x13,0x02 TLS_AES_256_GCM_SHA384
- 0x13,0x03 TLS_CHACHA20_POLY1305_SHA256
TLSv1.2:
- 0xC0,0x2B ECDHE-ECDSA-AES128-GCM-SHA256
- 0xC0,0x2F ECDHE-RSA-AES128-GCM-SHA256
- 0xC0,0x2C ECDHE-ECDSA-AES256-GCM-SHA384
- 0xC0,0x30 ECDHE-RSA-AES256-GCM-SHA384
- 0xCC,0xA9 ECDHE-ECDSA-CHACHA20-POLY1305
- 0xCC,0xA8 ECDHE-RSA-CHACHA20-POLY1305
- 0x00,0x9E DHE-RSA-AES128-GCM-SHA256
- 0x00,0x9F DHE-RSA-AES256-GCM-SHA384
This is the recommended configuration for the vast majority of services, as it is highly secure and compatible with nearly every client relea
The remote host is vulnerable to one or more conditions that are considered to be 'automatic failures' according to the PCI DSS Approved
- Internet reachable database servers (must validate whether cardholder data is stored)
- Use of older, insecure SSL/TLS versions (TLS v1.2 is the minimum standard)
- Scan Interference
Details of the failed items may be found in the 'Output' section of this plugin result. These vulnerabilities and/or failure conditions will hav
If you are conducting this scan via Tenable.io and either disagree with any of the results, believe there are false-positives, or must rely on c
in Tenable.io and dispute or provide mitigation evidence for each of the residual findings.
The version of the Apache Shiro open source security framework running on the remote web server is affected by an error in the path-bas
using directory traversal, to bypass intended access restrictions, resulting in the disclosure of sensitive information.
Nessus has found HTML forms on the remote web server. Some CGI scripts do not appear to be protected by random tokens, a common a
The remote host has open SSL/TLS ports which advertise discouraged cipher suites. It is recommended to only enable support for the follo
TLSv1.3:
- 0x13,0x01 TLS_AES_128_GCM_SHA256
- 0x13,0x02 TLS_AES_256_GCM_SHA384
- 0x13,0x03 TLS_CHACHA20_POLY1305_SHA256
TLSv1.2:
- 0xC0,0x2B ECDHE-ECDSA-AES128-GCM-SHA256
- 0xC0,0x2F ECDHE-RSA-AES128-GCM-SHA256
- 0xC0,0x2C ECDHE-ECDSA-AES256-GCM-SHA384
- 0xC0,0x30 ECDHE-RSA-AES256-GCM-SHA384
- 0xCC,0xA9 ECDHE-ECDSA-CHACHA20-POLY1305
- 0xCC,0xA8 ECDHE-RSA-CHACHA20-POLY1305
- 0x00,0x9E DHE-RSA-AES128-GCM-SHA256
- 0x00,0x9F DHE-RSA-AES256-GCM-SHA384
This is the recommended configuration for the vast majority of services, as it is highly secure and compatible with nearly every client relea
The remote host is vulnerable to one or more conditions that are considered to be 'automatic failures' according to the PCI DSS Approved
- Vulnerabilities with a CVSS base score greater than or equal to 4.0
- Use of older, insecure SSL/TLS versions (TLS v1.2 is the minimum standard)
- Scan Interference
Details of the failed items may be found in the 'Output' section of this plugin result. These vulnerabilities and/or failure conditions will hav
If you are conducting this scan via Tenable.io and either disagree with any of the results, believe there are false-positives, or must rely on c
in Tenable.io and dispute or provide mitigation evidence for each of the residual findings.
The version of the Apache Shiro open source security framework running on the remote web server is affected by an error in the path-bas
using directory traversal, to bypass intended access restrictions, resulting in the disclosure of sensitive information.
The web server running on the remote host appears to be using Microsoft ASP.NET, and may be affected by a denial of service vulnerabilit
Additionally, there is speculation that this vulnerability could result in code execution if an attacker with physical access to the machine co
The remote host has open SSL/TLS ports which advertise discouraged cipher suites. It is recommended to only enable support for the follo
TLSv1.3:
- 0x13,0x01 TLS_AES_128_GCM_SHA256
- 0x13,0x02 TLS_AES_256_GCM_SHA384
- 0x13,0x03 TLS_CHACHA20_POLY1305_SHA256
TLSv1.2:
- 0xC0,0x2B ECDHE-ECDSA-AES128-GCM-SHA256
- 0xC0,0x2F ECDHE-RSA-AES128-GCM-SHA256
- 0xC0,0x2C ECDHE-ECDSA-AES256-GCM-SHA384
- 0xC0,0x30 ECDHE-RSA-AES256-GCM-SHA384
- 0xCC,0xA9 ECDHE-ECDSA-CHACHA20-POLY1305
- 0xCC,0xA8 ECDHE-RSA-CHACHA20-POLY1305
- 0x00,0x9E DHE-RSA-AES128-GCM-SHA256
- 0x00,0x9F DHE-RSA-AES256-GCM-SHA384
This is the recommended configuration for the vast majority of services, as it is highly secure and compatible with nearly every client relea
The remote host is vulnerable to one or more conditions that are considered to be 'automatic failures' according to the PCI DSS Approved
- Internet reachable database servers (must validate whether cardholder data is stored)
- Use of older, insecure SSL/TLS versions (TLS v1.2 is the minimum standard)
- Scan Interference
Details of the failed items may be found in the 'Output' section of this plugin result. These vulnerabilities and/or failure conditions will hav
If you are conducting this scan via Tenable.io and either disagree with any of the results, believe there are false-positives, or must rely on c
in Tenable.io and dispute or provide mitigation evidence for each of the residual findings.
Nessus has found HTML forms on the remote web server. Some CGI scripts do not appear to be protected by random tokens, a common a
The remote host has open SSL/TLS ports which advertise discouraged cipher suites. It is recommended to only enable support for the follo
TLSv1.3:
- 0x13,0x01 TLS_AES_128_GCM_SHA256
- 0x13,0x02 TLS_AES_256_GCM_SHA384
- 0x13,0x03 TLS_CHACHA20_POLY1305_SHA256
TLSv1.2:
- 0xC0,0x2B ECDHE-ECDSA-AES128-GCM-SHA256
- 0xC0,0x2F ECDHE-RSA-AES128-GCM-SHA256
- 0xC0,0x2C ECDHE-ECDSA-AES256-GCM-SHA384
- 0xC0,0x30 ECDHE-RSA-AES256-GCM-SHA384
- 0xCC,0xA9 ECDHE-ECDSA-CHACHA20-POLY1305
- 0xCC,0xA8 ECDHE-RSA-CHACHA20-POLY1305
- 0x00,0x9E DHE-RSA-AES128-GCM-SHA256
- 0x00,0x9F DHE-RSA-AES256-GCM-SHA384
This is the recommended configuration for the vast majority of services, as it is highly secure and compatible with nearly every client relea
The remote host is vulnerable to one or more conditions that are considered to be 'automatic failures' according to the PCI DSS Approved
- Vulnerabilities with a CVSS base score greater than or equal to 4.0
- Use of older, insecure SSL/TLS versions (TLS v1.2 is the minimum standard)
- Scan Interference
Details of the failed items may be found in the 'Output' section of this plugin result. These vulnerabilities and/or failure conditions will hav
If you are conducting this scan via Tenable.io and either disagree with any of the results, believe there are false-positives, or must rely on c
in Tenable.io and dispute or provide mitigation evidence for each of the residual findings.
The 'commonName' (CN) attribute of the SSL certificate presented for this service is for a different machine.
Nessus has found HTML forms on the remote web server. Some CGI scripts do not appear to be protected by random tokens, a common a
You will need to audit the source of the CGI scripts and check if they are actually affected.
The HTTP headers sent by the remote web server disclose information that can aid an attacker, such as the server version and languages u
The remote host has open SSL/TLS ports which advertise discouraged cipher suites. It is recommended to only enable support for the follo
TLSv1.3:
- 0x13,0x01 TLS_AES_128_GCM_SHA256
- 0x13,0x02 TLS_AES_256_GCM_SHA384
- 0x13,0x03 TLS_CHACHA20_POLY1305_SHA256
TLSv1.2:
- 0xC0,0x2B ECDHE-ECDSA-AES128-GCM-SHA256
- 0xC0,0x2F ECDHE-RSA-AES128-GCM-SHA256
- 0xC0,0x2C ECDHE-ECDSA-AES256-GCM-SHA384
- 0xC0,0x30 ECDHE-RSA-AES256-GCM-SHA384
- 0xCC,0xA9 ECDHE-ECDSA-CHACHA20-POLY1305
- 0xCC,0xA8 ECDHE-RSA-CHACHA20-POLY1305
- 0x00,0x9E DHE-RSA-AES128-GCM-SHA256
- 0x00,0x9F DHE-RSA-AES256-GCM-SHA384
This is the recommended configuration for the vast majority of services, as it is highly secure and compatible with nearly every client relea
Solution
N/A
Restrict access to the application vulnerable to cross-site request forgery. Contact the vendor for a patch or upgrade.
N/A
Use an ISAPI filter to block requests for URLs with MS-DOS device names.
Only enable support for recommended cipher suites.
N/A
Restrict access to the application vulnerable to cross-site request forgery. Contact the vendor for a patch or upgrade.
Restrict access to the application vulnerable to cross-site request forgery. Contact the vendor for a patch or upgrade.
Modify the HTTP headers of the web server to not disclose detailed information about the underlying web server.
Only enable support for recommended cipher suites.
See Also Plugin OutpuAsset UUID VulnerabilityIP Address FQDN NetBios OS MAC AddresPlugin Famil
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
https://wiki.mozilla.org/Security/Server_Side_TLS
https://ssl-config.mozilla.org/
83d5ca09-34Active 64.178.217.7 Microsoft Windows ServeGeneral
+ A high risk flaw was found. See :
http://www.nessus.org/plugins/index.php?view=single&id=119811
+ 3 medium risk flaws were found. See :
http://www.nessus.org/plugins/index.php?view=single&id=50600
http://www.nessus.org/plugins/index.php?view=single&id=159543
http://www.nessus.org/plugins/index.php?view=single&id=56818
https://www. a8ee497c-feActive 64.178.217.19 Microsoft Windows ServePolicy Compl
------------------------------ snip ------------------------------
http://www. a8ee497c-feActive 64.178.217.19 Microsoft Windows ServeCGI abuses
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
https://wiki.mozilla.org/Security/Server_Side_TLS
{export flag}
https://ssl-config.mozilla.org/
8a565c26-d3Active 64.178.217. ccp.bppr.com Microsoft Windows ServeGeneral
+ A high risk flaw was found. See :
http://www.nessus.org/plugins/index.php?view=single&id=64588
+ 2 medium risk flaws were found. See :
http://www.nessus.org/plugins/index.php?view=single&id=50600
http://www.nessus.org/plugins/index.php?view=single&id=159543
https://www. a7fb4dd7-cdActive 64.178.217. checkout.evertecinc.comMicrosoft Windows ServePolicy Compl
------------------------------ snip ------------------------------
http://www. a7fb4dd7-cdActive 64.178.217. checkout.evertecinc.comMicrosoft Windows ServeCGI abuses
Nessus received an HTTP 500 or related error message by requesting
the following URL :
https://seclists.org/fulldisclosure/2007/May/378
https://seclists.org/fulldisclosure/2007/May/415
https://checkout.evertecinc.com/AUX/.aspx
http://www.nessus.org/u?d32fbf50
" a7fb4dd7-cdActive 64.178.217. checkout.evertecinc.comMicrosoft Windows ServeWeb Servers
RSA-AES128-SHA256 0x00, 0x9C RSA RSA AES-GCM(128) SHA256
RSA-AES256-SHA384 0x00, 0x9D RSA RSA AES-GCM(256) SHA384
ECDHE-RSA-AES128-SHA 0xC0, 0x13 ECDH RSA AES-CBC(128) SHA1
ECDHE-RSA-AES256-SHA 0xC0, 0x14 ECDH RSA AES-CBC(256) SHA1
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1
CAMELLIA128-SHA 0x00, 0x41 RSA RSA Camellia-CBC(128) SHA1
CAMELLIA256-SHA 0x00, 0x84 RSA RSA Camellia-CBC(256) SHA1
ECDHE-RSA-AES128-SHA256 0xC0, 0x27 ECDH RSA AES-CBC(128) SHA256
ECDHE-RSA-AES256-SHA384 0xC0, 0x28 ECDH RSA AES-CBC(256) SHA384
RSA-AES128-SHA256 0x00, 0x3C RSA RSA AES-CBC(128) SHA256
RSA-AES256-SHA256 0x00, 0x3D RSA RSA AES-CBC(256) SHA256
{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
https://wiki.mozilla.org/Security/Server_Side_TLS
{export flag}
https://ssl-config.mozilla.org/
bc70d8ba-54Active 64.178.217. mmpay.evertecpr.com Microsoft Windows ServeGeneral
+ 4 medium risk flaws were found. See :
http://www.nessus.org/plugins/index.php?view=single&id=45411
http://www.nessus.org/plugins/index.php?view=single&id=159543
http://www.nessus.org/plugins/index.php?view=single&id=88099
http://www.nessus.org/plugins/index.php?view=single&id=56818
https://www.wsathmovil.evertecinc.com
b4096466-1aActive 64.178.217.30 Microsoft Windows ServePolicy Compl
b4096466-1aActive 64.178.217.30 Microsoft Windows ServeGeneral
0 0 0 0 unknown 2023-01-14T
0 0 0 0 unknown 2023-01-14T
0 0 0 0 unknown 2023-01-14T
6.4 0 AV:N/AC:L/A 6.5 0 AV:N/AC:L/PR
unknown 2023-01-14T
0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0
0 0 0 1 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0
0 0 0 1 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0
0 0 0 1 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0
Patch Availa In The NewsUnsupportedLast Fixed Mnemonic Application Manager
Daniel Brignardello
Daniel Brignardello
Daniel Brignardello
Daniel Brignardello
Daniel Brignardello
Daniel Brignardello
Daniel Brignardello
Daniel Brignardello
Daniel Brignardello
Daniel Brignardello
Daniel Brignardello
Daniel Brignardello
Daniel Brignardello
Daniel Brignardello
Daniel Brignardello
Daniel Brignardello
Daniel Brignardello
Daniel Brignardello
Daniel Brignardello
Daniel Brignardello
Daniel Brignardello
Daniel Brignardello
Daniel Brignardello
Plugin ID CVE CVSS Risk Host Protocol Port
The remote host has been found to be NOT COMPLIANT with the PCI DSS external scanning requirements.
0 0 0 general-pur 2023-01-14T2023-01-14T
0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0
In The NewsUnsupportedLast Fixed App Mneumo
Application Application Leader
Cyber-criminals w
Cyber-criminals w
Cyber-criminals w
HTTP 98056 Missing HTTP Strict Transport Security Policy 2017202owahtt Med
HTTP 98715 Permissive HTTP Strict Transport Security Policy Detected 2019202owahtt Med
HTTP 98056 Missing HTTP Strict Transport Security Policy 2017202owahtt Med
SSL/ 98617 SSL/TLS Forward Secrecy Cipher Suites Not Supported 2019202owahtt Med
SSL/ 98617 SSL/TLS Forward Secrecy Cipher Suites Not Supported 2019202owahtt Med
Comp 112442 Microsoft IIS Tilde Character Short File/Folder Name Disclosure 2020202owahtt Med
HTTP 98056 Missing HTTP Strict Transport Security Policy 2017202owahtt Med
HTTP 98715 Permissive HTTP Strict Transport Security Policy Detected 2019202owahtt Med
Comp 112442 Microsoft IIS Tilde Character Short File/Folder Name Disclosure 2020202owahtt Med
SSL/ 98617 SSL/TLS Forward Secrecy Cipher Suites Not Supported 2019202owahtt Med
HTTP 98715 Permissive HTTP Strict Transport Security Policy Detected 2019202owahtt Med
Data 113164 AWS Credentials Disclosure 2022202owahtt Med
Depending on the framework being used the implementation methods will vary,
however it is advised that the `Strict-Transport-Security` header be configured on the
server.
One of the options for this header is `max-age`, which is a representation (in
milliseconds) determining the time in which the client's browser will adhere to the
header policy.
Depending on the environment and the application this time period could be from as low
as minutes to as long as days. 7298202202
The max-age must be set at least to 31536000 seconds (1 year) and includeSubDomains
directive must be specified. 86c5202202
Depending on the framework being used the implementation methods will vary,
however it is advised that the `Strict-Transport-Security` header be configured on the
server.
One of the options for this header is `max-age`, which is a representation (in
milliseconds) determining the time in which the client's browser will adhere to the
header policy.
Depending on the environment and the application this time period could be from as low
as minutes to as long as days. 8700202202
Reconfigure the affected server to enable cipher suites providing forward secrecy (ECDHE
or DHE based cipher suites). 9596202202
Reconfigure the affected server to enable cipher suites providing forward secrecy (ECDHE or DH
9dfc202202
Web application should not trust Host and X-Forwarded-Host and should use a secure
SERVER_NAME instead of these headers. a6e9202202
As a workaround, disable the 8.3 file and directories name creation, manually remove
names already present in the fileystem and ensure that URL requests containing the tilde
character (and its unicode equivalences) are discarded before reaching the IIS server.
If possible, upgrade to the latest version of the .NET framework and IIS server. a7d6202202
Depending on the framework being used the implementation methods will vary,
however it is advised that the `Strict-Transport-Security` header be configured on the
server.
One of the options for this header is `max-age`, which is a representation (in
milliseconds) determining the time in which the client's browser will adhere to the
header policy.
Depending on the environment and the application this time period could be from as low
as minutes to as long as days. ab8e202202
The max-age must be set at least to 31536000 seconds (1 year) and includeSubDomains
directive must be specified. abf1202202
Ensure that the detected AWS credentials are expected to be available to users, and that
the permissions are defined according to their purpose and to AWS security best
practices. ae7f202202
As a workaround, disable the 8.3 file and directories name creation, manually remove
names already present in the fileystem and ensure that URL requests containing the tilde
character (and its unicode equivalences) are discarded before reaching the IIS server.
If possible, upgrade to the latest version of the .NET framework and IIS server. b616202202
Reconfigure the affected server to enable cipher suites providing forward secrecy (ECDHE
or DHE based cipher suites). c576202202
The max-age must be set at least to 31536000 seconds (1 year) and includeSubDomains directie480202202
Ensure that the detected AWS credentials are expected to be available to users, and that
the permissions are defined according to their purpose and to AWS security best
practices. e49d202202
Purchase or generate a new SSL/TLS certificate with the right Common Name or Subject
Alternative Name to replace the existing one. f0d1202202
The max-age must be set at least to 31536000 seconds (1 year) and includeSubDomains directif678202202
Purchase or generate a new SSL/TLS certificate with the right Common Name or Subject Alterna
f7b9202202
Purchase or generate a new SSL/TLS certificate with the right Common Name or Subject
Alternative Name to replace the existing one. f981202202
output
The scanner did not find any Strict-Transport-Security header in the response returned by the target when querying URL https://64.178.21
The 'max-age' directive set within the HTTP Strict Transport Security Policy header is 16070400 and thus less than the required 31536000 s
max-age=16070400; includeSubDomains
The scanner did not find any Strict-Transport-Security header in the response returned by the target when querying URL https://mmpay.e
TLS1.2 TLS_RSA_WITH_AES_128_CBC_SHA256 RSA 2048
TLS1.2 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA RSA 2048
TLS1.2 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA RSA 2048
Host header injection has been detected on https://mmpay.evertecinc.com/wsCheckoutPayment.asmx?op=MakePayment using the injecti
The scanner has been able to detect the presence of short files and directories names on the target server.
The scanner did not find any Strict-Transport-Security header in the response returned by the target when querying URL https://64.178.21
Strict-Transport-Security source can be found below:
max-age=16070400; includeSubDomains
The scanner has been able to detect the presence of short files and directories names on the target server.
TLS1.2 TLS_RSA_WITH_AES_128_CBC_SHA256 RSA 2048
TLS1.2 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA RSA 2048
max-age=16070400; includeSubDomains
The scanner detected an AWS access key ID and a secret key.
Signature: sha256WithRSAEncryption
max-age=16070400; includeSubDomains
Signature: sha256WithRSAEncryption
risk_modified severity state AppMneumonic Application Name Manager Leader
NONE Medium ACTIVE CCPY CALL CENTER PAY Hector RiveraDaniel Brign
NONE Medium ACTIVE EVPW EVERPAY WEB Hector RiveraDaniel Brign
NONE Medium ACTIVE CCPY CALL CENTER PAY Hector RiveraDaniel Brign
NONE Medium ACTIVE CCPY CALL CENTER PAY Hector RiveraDaniel Brign
NONE Medium ACTIVE CCPY CALL CENTER PAY Hector RiveraDaniel Brign
NONE Medium ACTIVE CCPY CALL CENTER PAY Hector RiveraDaniel Brign
NONE Medium ACTIVE CCPY CALL CENTER PAY Hector RiveraDaniel Brign
URL
checkout.evertecinc.com
mmpay.evertecinc.com
mmpay.evertecinc.com
ccp.bppr.com
everpayweb.evertecinc.com
mmpay.evertecinc.com
ccp.bppr.com
mmpay.evertecinc.com
ccp.bppr.com
ccp.bppr.com
ccpy.evertecinc.com
checkout.evertecinc.com
everpayweb.evertecinc.com
ccpy.evertecinc.com
checkout.evertecinc.com
dashboard.evertecinc.com
dashboard.evertecinc.com
ccp.bppr.com
Item
set a custom HTTP header for Strict-Transport-Security with the value max-age=31536000; includeSubDomains; preload in the
set a custom HTTP header for Strict-Transport-Security with the value max-age=31536000; includeSubDomains; preload in the
set a custom HTTP header for Strict-Transport-Security with the value max-age=31536000; includeSubDomains; preload in the
https://www.digicert.com/kb/ssl-support/ssl-enabling-perfect-forward-secrecy.htm
Security scan tools may flag Host Header related findings as a vulnerability. Here are the best practices for preventing attacker
<entry> key="magicFinalPartList">
<![CDATA[\a.aspx,\a.asp,/a.aspx,/a.asp,/a.shtml,/a.asmx,/a.ashx,/a.config,/a.php,/a.jpg,/webresource.axd,,/a.xxx]]>
</entry>
set a custom HTTP header for Strict-Transport-Security with the value max-age=31536000; includeSubDomains; preload in the
set a custom HTTP header for Strict-Transport-Security with the value max-age=31536000; includeSubDomains; preload in the
Ensure that the detected AWS credentials are expected to be available to users, and that the permissions are defined accordin
best practices.
<entry> key="magicFinalPartList">
<![CDATA[\a.aspx,\a.asp,/a.aspx,/a.asp,/a.shtml,/a.asmx,/a.ashx,/a.config,/a.php,/a.jpg,/webresource.axd,,/a.xxx]]>
</entry>
Ensure that the detected AWS credentials are expected to be available to users, and that the permissions are defined accordin
best practices.
https://www.leaderssl.com/articles/388-common-name-mismatch-error-effective-ways-to-solve-a-problem#:~:text=If%20you
%20error%20will%20disappear%20afterwards.
https://www.leaderssl.com/articles/388-common-name-mismatch-error-effective-ways-to-solve-a-problem#:~:text=If%20you
%20error%20will%20disappear%20afterwards.
N/A
Link Is F5
https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security X
https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security
https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security
https://techcommunity.microsoft.com/t5/iis-support-blog/host-header-vulnerability/ba-
p/1031958
https://serverfault.com/questions/670658/fixing-the-iis-tilde-vulnerability
https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security
https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security
https://aws.amazon.com/es/blogs/security/what-to-do-if-you-inadvertently-expose-an-
aws-access-key/
https://serverfault.com/questions/670658/fixing-the-iis-tilde-vulnerability
https://learn.microsoft.com/en-us/windows-server/security/tls/manage-tls
https://aws.amazon.com/es/blogs/security/what-to-do-if-you-inadvertently-expose-an-
aws-access-key/
https://www.leaderssl.com/articles/388-common-name-mismatch-error-effective-ways-to-
solve-a-problem#:~:text=If%20you%20purchased%20a%20static,The%20error%20will
%20disappear%20afterwards.
https://www.leaderssl.com/articles/388-common-name-mismatch-error-effective-ways-to-
solve-a-problem#:~:text=If%20you%20purchased%20a%20static,The%20error%20will
%20disappear%20afterwards.
https://learn.microsoft.com/en-us/windows-server/security/tls/manage-tls
https://support.huawei.com/enterprise/en/doc/EDOC1000111845/bdcf1729/33929---pci-
dss-compliance