The latest update to the TrustKeeper scan engine that powers our Trustwave Vulnerability Management product (including both internal and external vulnerability scanning) is now available.
This week we've added coverage for 13 new vulnerabilities relating to Cisco, FreeBSD, and WordPress. This week, we're also joined by our fellow colleagues from SpiderLabs Pentest to add to the fun and excitement.
These additions include detection for Java Debug Wire Protocol (JDWP), which is usually a guaranteed source of Java Remote Code Execution by Sebastien Macke and an extension to our existing coverage to detect Shellshock (CVE-2014-6271) on Dell SonicWall devices using a customized payload by Dan Turner.
New Vulnerability Test Highlights
Some of the more interesting vulnerability tests we added recently are as follows:
- Cisco ASA WebVPN portal DOM based Cross-Site-Scripting Issue (CSCuh24695) (CVE-2014-8012)
- Java Debug Wire Procotol (JDWP) service detected
- Demo Credit Card Information Detected
- ShellShock coverage extension (for Dell SonicWall devices)
- FreeBSD OpenSSL multiple vulnerabilities (FreeBSD-SA-14:03.openssl) (CVE-2013-4353, CVE-2013-6449, CVE-2013-6450)
- vSphere Server Web Interface Default Credentials
- WordPress Cross-site Request Forgery via Reset Passwords Vulnerability (CVE-2014-9033)
- WordPress Cross-site Scripting via CSS Token Vulnerability (CVE-2014-9036)
- WordPress Cross-site Scripting via Media-Playlists Feature (CVE-2014-9032)
- WordPress Cross-site Scripting via shortcode brackets Vulnerability (CVE-2014-9031)
- WordPress Cross-site Scripting via unspecified vectors (CVE-2014-9035)
- WordPress Idle Account Access via MD5 Hash Vulnerability (CVE-2014-9037)
- WordPress Long Password Denial of Service Vulnerability (CVE-2014-9034)
- WordPress Reset Password Message Vulnerability (CVE-2014-9039)
- WordPress Server-side Request Forgery via 127.0.0.0/8 Resource Vulnerability (CVE-2014-9038)
How to Update?
All Trustwave customers using the TrustKeeper Scan Engine receive the updates automatically as soon as an update is available. No action is required.