12 Hosting Vulnerabilities with Defender

Hi I installed Defender and Snapshot (switched from iThemes security and Wordfence) and also used the service Beyond security to scan vulnerabilities. First, great, I got a A+ score :slight_smile:

But I wanted to point out few vulnerabilities that I believe are related to the server. That site is hosted with Bluehost so I can’t do much about it. If I understand Defender does not include a firewall? If it doesn’t it would be great to add it! Thank you for your help!

Here they are:

SMTP Service Cleartext Login Permitted

SMTP Authentication Methods

FTP Service AUTH TLS Command Support

IMAP Service STARTTLS Command Support

SSH Server Backported Security Patches

FTP Clear Text Authentication

TCP Timestamps Retrieval

ICMP Echo Request

IMAP Banner

SSH Detection

SSH Server Detection

SMTP Server Detection

Security Testing

Type Tests Failed Passed

Infrastructure Tests 13348 25 13323

Blind SQL Injection 2856 0 2856

SQL Injection 3468 0 3468

Cross Site Scripting 5916 0 5916

Source Disclosure 3468 0 3468

PHP Code Injection 1632 0 1632

Windows Command Execution 2448 0 2448

UNIX Command Execution 2652 0 2652

UNIX File Disclosure 1632 0 1632

Windows File Disclosure 5508 0 5508

Directory Disclosure 3468 0 3468

Remote File Inclusion 204 0 204

HTTP Header Injection 1836 0 1836

Low risk vulnerabilities results:

1. SMTP Service Cleartext Login Permitted (Low)back

Port: smtp (25/tcp)

Summary:

The remote host is running an SMTP server that advertises that it allows cleartext logins over unencrypted connections.

The SMTP server advertises the following SASL methods over an unencrypted channel:

All supported methods: LOGIN, PLAIN

Cleartext methods: LOGIN, PLAIN

Recommended Solution:

Configure the service to support less secure authentication mechanisms only over an encrypted channel.

Impact:

An attacker may be able to uncover user names and passwords by sniffing traffic to the server if a less secure authentication mechanism (i.e. LOGIN or PLAIN) is used.

More information: http://tools.ietf.org/html/rfc4422 and http://tools.ietf.org/html/rfc4954

Test ID: 14652

2. SMTP Authentication Methods (Low)back

Port: smtp (25/tcp)

Summary:

The remote SMTP server advertises that it supports authentication.

The following authentication methods are advertised by the SMTP server without encryption:

* LOGIN

* PLAIN

Recommended Solution:

Review the list of methods and whether they’re available over an encrypted channel.

More information: http://tools.ietf.org/html/rfc4422 and http://tools.ietf.org/html/rfc4954

Test ID: 13476

3. FTP Service AUTH TLS Command Support (Low)back

Port: ftp (21/tcp)

Summary:

The remote FTP service supports the use of the ‘AUTH TLS’ command to switch from a plaintext to an encrypted communications channel.

More information: http://en.wikipedia.org/wiki/STARTTLS and http://tools.ietf.org/html/rfc4217

Test ID: 11982

4. IMAP Service STARTTLS Command Support (Low)back

Port: imap (143/tcp)

Summary:

The remote IMAP service supports the use of the ‘STARTTLS’ command to switch from a plaintext to an encrypted communications channel.

More information: http://en.wikipedia.org/wiki/STARTTLS and http://tools.ietf.org/html/rfc2595

Test ID: 11965

5. SSH Server Backported Security Patches (Low)back

Port: ssh (22/tcp)

Summary:

Security patches may have been ‘back ported’ to the remote SSH server without changing its version number. Banner-based checks have been disabled to avoid false positives.

Test ID: 11776

6. FTP Clear Text Authentication (Low)back

Port: ftp (21/tcp)

Summary:

The remote FTP does not encrypt its data and control connections. The user name and password are transmitted in clear text and may be intercepted by a network sniffer, or a man-in-the-middle attack.

Recommended Solution:

Switch to FTPS (FTP over SSL/TLS) or SFTP (part of the SSH suite).

Test ID: 11278

7. TCP Timestamps Retrieval (Low)back

Port: general/tcp

Summary:

The remote host implements TCP timestamps, as defined by RFC1323. A side effect of this feature is that the uptime of the remote host can be sometimes be computed.

The uptime was estimated to 6322245s, i.e. about 73 days.

(Note that the clock is running at about 100 Hz and will overflow in about 42949672s, that is 497 days)

More information: http://www.ietf.org/rfc/rfc1323.txt

Test ID: 10399

8. ICMP Echo Request (Low)back

Port: general/icmp

Summary:

The remote host answers an ICMP echo request (ping).

Recommended Solution:

Filter out the ICMP echo requests (8)

Impact:

The remote host answers ping, an attacker can use this to determine the host is running.

Test ID: 9507

9. IMAP Banner (Low)back

Port: imap (143/tcp)

Summary:

This test returns the IMAP banner:

* OK [CAPABILITY IMAP4rev1 LITERAL+ SASL-IR LOGIN-REFERRALS ID ENABLE IDLE STARTTLS AUTH=PLAIN AUTH=LOGIN] Dovecot ready.

Test ID: 2242

10. SSH Detection (Low)back

Port: ssh (22/tcp)

Summary:

The remote SSH daemon supports the following versions of the SSH protocol:

. 1.99

. 2.0

SSHv2 host key fingerprint : 0c:ab:47:ae:ab:93:ba:4b:6f:63:bf:bd:0d:17:ef:5f

Test ID: 1642

11. SSH Server Detection (Low)back

Port: ssh (22/tcp)

Summary:

An SSH daemon was detected and the following banner was received:

SSH version: SSH-2.0-OpenSSH_5.3

SSH supported authentication: publickey,password

Recommended Solution:

Make sure this doesn’t include information about the server’s type or version. Change it to something generic like ‘welcome’.

Test ID: 942

12. SMTP Server Detection (Low)back

Port: smtp (25/tcp)

Summary:

This is what your SMTP server told us about itself:

220-box1319.bluehost.com ESMTP Exim 4.86_1 #1 Mon, 02 Jan 2017 21:53:09 -0700

220-We do not authorize the use of this system to transport unsolicited,

220 and/or bulk e-mail.

Recommended Solution:

For Exchange server, see: http://support.microsoft.com/support/kb/articles/Q281/2/24.ASP

For Sendmail, edit the configuration file (usually /etc/sendmail.cf) change the line that begins with:

O SmtpGreetingMessage

And delete the string ‘$v/$Z’ which is the sendmail version.

Impact:

Attackers can gain critical information about the host.

Test ID: 939

  • Kasia Swiderska
    • Support nomad

    Hello Marie-Neige,

    No, Defender does not have at the moment firewall and there are no plans to include that feature in nearest future I’m afraid.

    But I wanted to point out few vulnerabilities that I believe are related to the server. That site is hosted with Bluehost so I can’t do much about it.

    I’m not sure what is your question here? Are you asking that Defender should also scan for those vulnerabilities you listed from another scan service? Please advise.

    kind regards,

    Kasia